The second part of the article continues the review of tools designed for pentesting and social engineering. You will learn about even more devices and technologies that will allow you to expand your testing capabilities and ensure maximum effectiveness in detecting vulnerabilities. Regardless of the complexity of the task, the presented tools will help to achieve the desired results, supplementing the solutions already considered in the first part.
Converter for connecting USB devices to TTL ports, used for work with microcontrollers.
A device for covert capture of a video signal from the screen via an HDMI connection.
The network attack kit includes various tools for working with cables and connections.
A device for injecting malicious code through a USB connection, allows you to quickly gain control over the system.
A compact network tool for conducting pentests, allows you to quickly collect data about the network.
A device for auditing wireless networks, allows conducting man-in-the-middle attacks and others.
A set for working with SIM cards at a distance or in conditions of limited access.
A device that looks like a regular USB cable, but can perform malicious actions.