Difference between revisions of "Sniffing Devices"

From Embedded Lab Vienna for IoT & Security
Jump to navigation Jump to search
Line 16: Line 16:
* [[Key Croc - Smart Keylogger]] - Smart keylogger, Keystroke Injection, Network Hijacking, Detection Evasion via WiFi
* [[Key Croc - Smart Keylogger]] - Smart keylogger, Keystroke Injection, Network Hijacking, Detection Evasion via WiFi
* [[O.MG Cable Programmer USB]] - Programmer to exploit USB cable
* [[O.MG Cable Programmer USB]] - Programmer to exploit USB cable
* [[O O.MG Demonseed EDU, educational set malicious USB cable]] - Educational hardware implant kit, for assembling and programming a malicious USB cable.  
* [[O.MG Demonseed EDU, educational set malicious USB cable]] - Educational hardware implant kit, for assembling and programming a malicious USB cable.  
* [[O.MG Exploit USB Cable USB-C to USB-A]] - Covert exploitation kit USB cable, runs a Webserver and works also as wireless access point
* [[O.MG Exploit USB Cable USB-C to USB-A]] - Covert exploitation kit USB cable, runs a Webserver and works also as wireless access point
* [[O.MG Malcious USB Cable Detector]] - Detect malicous USB cables and block data while charging.
* [[O.MG Malcious USB Cable Detector]] - Detect malicous USB cables and block data while charging.

Revision as of 19:50, 15 November 2022

Summary

This documentary mentions sniffing devices of the Elvis Lab maintained at the date of 19-12-2021.

Wired Technologies

  • USB
  • LAN
  • cable connected IoT protocols

USB

LAN - Ethernet

Cable connected IoT protocols

Wireless Technologies

  • WiFi
  • Bluetooth LE (advertising only)
  • 802.15.4 (used by Zigbee, Xbee, 6LoWPAN)
  • ZWave (European frequency, 868MHz)
  • RFID + NFC

Wireless WiFi

802.11ac WiFi, Bluetooth 4.2

Bluetooth

Zigbee

802.15.4 (Zigbee, 6LoWPAN)

Z-Wave

LoRa

Wireless access point

RFID + NFC

  • Proxmark 3- for sniffing in low frequency ( 125kHz and 134kHz) and high frequency (13.56mHz) bands