Hacking For Babies
  • Introduction
  • Ethical Hacking
  • Kali Linux
    • Why Kali ?
    • Virtual Machine
    • kali on Cloud
    • Bootable USB
    • Dual Boot Kali
    • Kali Nethunter
    • Most Used Linux Commands
    • Additional Information
  • Network Basics
    • What is the internet ?
    • Key Words
    • Network devices
    • LAN / WAN
    • VPN (Virtual Private Network)
    • Deep and Dark Web
    • Networking Commands
    • Additional Information
  • OSINT
    • Maltego
    • Google Advanced Search Operators
    • OSINT Username Finder
    • Social Media OSINT
    • Reverse Image Search
    • Protect yourself from OSINT
    • Additional Information
  • Digital Forensics
  • Phishing Attacks
    • Temporary Numbers
    • GitHub Projects/Tools
    • Kali Pre-Installed Tools
    • Emails Tricks
    • How to secure yourself from phishing attacks
    • Additional Information
  • Hardware Attacks
    • Marketplaces and Websites
    • Keylogger
    • USB Killer
    • Ethernet Hacking Tools
    • Flipper Zero
    • Bad USB
  • HID Attacks
    • Classic Bad USB
    • Wireless Bad USB
    • Keystroke Injection Cable
    • Other Tools Using the Some Concept
    • Simple Ducky Script
    • Reverse Shell Ducky Script
    • Solution for Bad USB
  • Cryptography
    • What is Cryptography ?
    • Simple Cryptography Algorithms
    • Hash Algorithms
    • Symmetric / Asymmetric cryptography
    • RSA Cryptosystem
    • Quantum Computers VS Cryptography
    • Steganography: Hiding Data in music and photos
    • Additional Information
  • Password Attacks
    • Dictionary Attacks
    • Brute Force Attacks
    • Hashcat
    • Hydra
    • Other Password Attacks Tools
    • Protect your Self against Password Attacks
  • Wireless Attacks
    • RFID / NFC Attacks
    • Bluetooth Attacks
    • MouseJack Attacks
    • IR Replay Attacks
    • RF Attacks
    • Wifi Attacks
  • WIFI Attacks
    • Wireless Adapters
    • Basic WIFI Manipulation
    • Deauthentication Attack
    • WIFI Cracking
    • MITM Attacks
    • Prebuild WIFI Pentesting Tools
    • WIFI Attack Solution
    • Additional Information
  • WIFI Cracking
    • WEP Cracking
    • WPS Attack
    • WPA Handshake Capture
    • PMKID Hash Capture
    • Hashcat Cracking
    • Wifite
    • Airgeddon
    • Fern WIFI Cracker
    • Protecting your Wi-Fi network from cracking
  • Coming Soon
Powered by GitBook
On this page
  • Hak5 SharkJack
  • Hak5 LAN Turtle
  • GREAT SCOTT GADGETS Throwing Star LAN Tap Pro
  • HAK5 PLUNDER BUG LAN TAP
  • Hak5 PACKET SQUIRREL
  • DIY Ethernet Cables Sniffer
  • Solution for Ethernet Hacking Tools
  • Switchers configuration
  • Syba RJ45 Locking Port Dust Blocker
  1. Hardware Attacks

Ethernet Hacking Tools

PreviousUSB KillerNextFlipper Zero

Last updated 1 year ago

Hak5 SharkJack

Hotplug attack, meet LAN. These pocket-sized pentest boxes perform network assessments in seconds!

As tiny Linux computers, they run DuckyScriptâ„¢ payloads powered by Bash. Armed out-of-the-box with an ultra fast network scanner, you'll get recon with the flick of a switch.

Or flip the switch to arming mode and sync up with the online library for a plethora of payloads — remote access, exfiltration & more.

With feedback by RGB LED, and now live in-shell with USB-C Serial on the NEW Cable edition.

DIY SharkJack

Hak5 LAN Turtle

The LAN Turtle is a covert system Administration and Penetration Testing tool providing stealth remote access, network intelligence gathering, and man-in-the-middle surveillance capabilities through a simple graphic shell.

Housed within a generic "USB Ethernet Adapter" case, the LAN Turtle’s covert appearance allows it to blend into many IT environments.

GREAT SCOTT GADGETS Throwing Star LAN Tap Pro

The Throwing Star LAN Tap is a passive Ethernet tap, requiring no power for operation. There are active methods of tapping Ethernet connections (e.g., a mirror port on a switch), but none can beat passive taps for portability. To the target network, the Throwing Star LAN Tap looks just like a section of cable, but the wires in the cable extend to the monitoring ports in addition to connecting one target port to the other.

HAK5 PLUNDER BUG LAN TAP

The Plunder Bug by Hak5 is pocket-sized LAN Tap that lets you "bug" Ethernet connections with USB-C convenience.

Coupled with cross-platform scripts for Windows, Mac and Linux – or an Android root app – this smart network sniffer enables passive recording or active scanning.

• Auto negotiating 10/100 Base-T Fast Ethernet • ASIX AX88772C USB Ethernet Chipset • USB-C Tap/Power port (5V, 20-300mA draw) • Complimentary Android app for select root devices • Connection scripts for Windows, Mac & Linux

Hak5 PACKET SQUIRREL

The man-in-the-middle that's nuts for networks

The Packet Squirrel by Hak5 is a stealthy pocket-sized man-in-the-middle.

This Ethernet multi-tool is designed to give you covert remote access, painless packet captures, and secure VPN connections with the flip of a switch.

DIY Ethernet Cables Sniffer

Solution for Ethernet Hacking Tools

Switchers configuration

Syba RJ45 Locking Port Dust Blocker

features:

  • locking rj45 port blocker, a premier layer 1 security solution tackles the security risks of open ports with the port blocker.

  • "the innovative design of the port blocker surpasses the conventional ""one size (or key) fits all"" design of its competitors and offers four unique."

  • locks unused rj45 ports. a patented solution that secures from unauthorized port access and security breaches

  • secures against unauthorized access

  • Connectivity technology: wire Operating system: Windows OS, Linux, FreeBSD, DOS

if you want to build your DIY LAN Turtle , you can watch created by to learn more about it .

if you want to build your DIY LAN Tap, you can watch created by to learn more about it .

You can watch created by .

You can watch created by .

this YouTube Video/Tutorial
Seytonic
this YouTube Video/Tutorial
Hak5
this YouTube Video/Tutorial
Sumsub
this YouTube Video/Tutorial
NetworkChuck
Shark JackHak5
The Shark Jack by Hak5Shark Jack
GitHub - hak5/sharkjack-payloads: The Official Hak5 Shark Jack Payload RepositoryGitHub
Samy Younsi / JabberJaw · GitLabGitLab
Make your own network attack device (Shark Jack DIY) - Samy NeroTeam LabsNecrum Security Labs - The Blog!
LAN TurtleHak5
LAN Turtle by Hak5LAN Turtle
Throwing Star LAN Tap - Great Scott Gadgets
Logo
GitHub - greatscottgadgets/throwing-star-lan-tap: A passive tap for monitoring 10/100 Ethernet.GitHub
Plunder Bug LAN TapHak5
Plunder Bug by Hak5Plunder Bug
Packet SquirrelHak5
Packet Squirrel by Hak5Packet Squirrel
Syba RJ45 Locking Port Dust Blocker with Removal Keys ToolAmazon.co.uk
Logo
Logo
Logo
Logo
Logo
Logo
Logo
Logo
Logo
Logo
Logo
Logo
Logo