6 Tools from DEF CON that hackers and spies are using right now (and that you can too)

6

The 20th annual DEF CON conference, the oldest and largest hacker gathering in the world, takes place this weekend in Las Vegas, Nevada. Thousands of hackers, spies, and security industry folk will be gathering to share what they have learned in the last year about technology, security and privacy, or the distinct lack thereof. Here are ACEHackware.com‘s picks for the coolest and stealthiest surveillance tools in their hackleboxes:

Wireless key loggers: These 5cm long devices may look like USB adapters, but they have powerful processors and enough memory and battery life to log billions of keystrokes and email them silently and automatically to an investigator or attacker. 

VideoGhosta covert screen capture device that looks like a monitor extention cable, Video Ghost enables the user to capture a screenshot every 5 minutes for more than two weeks. 

Stealth Video Recorders: Stealth video recorders come in all shapes and sizes, from buttonhole cameras to tiny MP3 players,  wrist watches, pens and hidden video micro recorders that look like car key fobs. A few hidden spy cams even include night vision capabilities and record in HD.

The Teensy: aptly named, the Teensy and Teensy++ are the size of a USB key, but using it’s USB port, this itty-bitty board can be loaded up with scripts or homegrown programs that can do almost anything. Used in conjunction with Nikhil Mittal’s open source Kautilya (featured at Black Hat this year) or David Kennedy’s Social Engineering Toolkit (SET), the Teensy can quickly compromise Linux, Mac and Windows hosts, even those with Autorun disabled.

Lock Pick sets and Bump Keys: Lock pick sets for every taste, some as small as a credit card that fit right into your wallet, others enclosed in a cylinder easily disguised as a ballpoint pen. Bump keys ? specially crafted keys that, with one strike from a hammer, can open any lock of the same model ? are available for almost all common locks.

The MiniPwnerThe simple Apple-like design of the easy-to hide (2.24″ square) MiniPwner belies it’s multitude of features, including pre-installed network scanning and spoofing tools and secure remote access capabilities.  Uses include: as a penetration tester’s drop box with wired and wireless access; war-walking (scanning for available wireless networks); or as a captive WiFi portal or rogue access point that can be used to maintain a connection to a targets’s network.

These 6 essentials are just the tip of the iceberg when it comes to hacker and spy gadgets. Many awesome tools will be on display at this year’s DEF CON, including a plethora of lock-picking, physical and digital surveillance devices that hackers, spies, law enforcement and computer security practitioners love to experiment with.

You don’t have to be a hacker or work for the NSA to experiment with these hi-tech tools. Everything mentioned in this article (and more!) can be found at the ACE Hackware booth at Defcon 20 or at ACEHackware.com.

See more
Pressking

About the author

pressking
By pressking