Skip to main content

1 – Essential Frugal Hackers Toolkit

1 – Essential Frugal Hackers Toolkit



INTRODUCTION


For those of you who dont know me, Im a network security analyst and project manager. I lead a team of network security analysts whose job it is to perform vulnerability assessments for the Department of Defense and to perform penetration tests for some commercial customers. Not only do I lead my team and work the contracts/business side of the house, a lot of the time I find myself on the ground at testing sites, working side by side with my employees. I am a competent tester and a very technical person, so
when scheduling conflicts arise and my team cant cover testing completely, I step in and lend a hand. Previous to this gig, I worked as a UNIX administrator for nearly fifteen years and managed a 1500
workstation hospitals mixed-technology network. I know Windows. I know Linux. I know (some) Cisco. I know SQL. Ive programmed web applications in Perl, Javascript and PHP.



Basically, Im a technology hound. I like to know how things work and I dont stop researching until I
find a satisfactory answer.



But Im not a celebrity chef. And Im not Stephen King. Im not rich. I live day to day on a budget. And
Im guessing that if you are reading this, then you do, too. After all, not everyone is lucky enough to have a limitless cash flow. 


In essence, I have to hack on a dime budget. I tend to piece together my computers and I rarely pay for

software (I dont pirate, I simply dont buy Microsoft Windows, if, in fact, I dont need it). I like to keep my dollars where they belong�in my own wallet, not someone elses.


So, with a frugal wallet in mind, Ive put together what I feel is an essential hackers toolkit. Ive

included in it a small array of hardware, some specialty, some not and Im here to tell you from the get-go that there will, indeed, be holes in our toolkit. There are some tools that simply cost too much
to seriously think about including in a frugal hackers toolkit. And, if Im totally honest, there will probably be tools that pop up along the way that well simply add to our toolkit. (I mean, the chances
that Ill remember everything right at the time of writing are slim to none)


Since were frugal (and not flat broke), we are going to spend a little money here and there.

However, what money we do spend, will be done for a reason: to easily get us results. Since were hackers, were lazy, right? And who really wants to sit and spin crucial cycles making a free/incredibly
cheap piece of hardware to work when we can spend a quick $30 and get that piece of hardware to work within a few minutes? I dont know about you, but Ill dish out a couple of bucks to save myself a headache and hack into a system faster.


So where do we start? Well, the following list is my starting point. Whenever I build a hacking toolkit, this is the checklist of equipment I usually pull together. Lets go over it, shall we?




THE
ESSENTIAL FRUGAL HACKERS TOOLKIT

Heres what youre going to need to amass in your collection. Ive been able to piece together most of
this kit from castoffs at my job. If youre job has an IT department, you might be able to get friendly with a tech and luck into a late model in the discard pile, as well. 

Lets start, shall we?

  1. A Late Model Laptop (Use the following specifications as a guideline. You can vary with any
    particular component, but try to stick close to the specs. Youll get the best experience if you keep the hardware modern�not necessarily new or the latest and greatest, just modern)
  • 80GB Hard Drive (or larger)
  • 1GB � 2GB RAM
  • CD/DVD ROM Drive (A writer is not
    necessary)
  • Built-In Wireless Card capable of
    being put into �monitor mode� (see below) OR
  • PCMCIA slot/USB slot for wireless
    card that can be put into �monitor mode�
  • Ethernet Cable Port
  • Multiple USB Ports
  1. A wireless card that is capable of being put into �monitor mode� (more on what �monitor
    mode� means later, but for now, stick to any wireless card that has the following chipsets built into it). Other than the actual laptop, this is where you want to spend some actual money. Not a lot
    of it, but some.
Wireless Chipsets to research:
  • Atheros (AR5XXX, AR9XXX)
  • Broadcom (B43XX Family)
  • Intel Pro Wireless and Intel Wifi
    Link (Centrino)
  • Ralink (RT2X00)
  • Realtek (RTL8187)

  1. Two or three Ethernet cables � you never know when things break
  2. A USB Bluetooth Adapter
  3. A small, inexpensive hub � were going to use this for wired network sniffing
  4. Two or three USB flash drives (sticks are the most preferable option here: 4GB-8GB, nothing more)

Basically, to demonstrate to you that Im practicing what I preach, Ill be piecing together my own kit and documenting it all along the way. So, throughout these lessons, youll see what I see and youll learn what I learn. This will be an in-depth look at penetration testing techniques, skills that youll need to hack a network and the tools you can use to evaluate a given networks security.

Also, some essential reading that I think youll find interesting is listed below. Ill be drawing from a lot of reference material and some of these books will contain in-depth data for us, as hackers.

ESSENTIAL READING
HACKING EXPOSED 6 by Stuart McClure, Joel Scambray, and George Kurtz
HACKING EXPOSED WIRELESS by Johnny Cache, Joshua Wright, and Vincent Liu
THE DATABASE HACKERS HANDBOOK by David Litchfield, Chris Anley, John Heasman and Bill Grindlay
THE WEB APPLICATION HACKERS HANDBOOK by Dafydd Stuttard and Marcus Pinto
OFFICIAL CERTIFIED ETHICAL HACKER REVIEW GUIDE By Steven DeFino, Barry Kaufman, Nick Valenteen and Larry Greenblatt
THE ART OF DECEPTION by Kevin Mitnick and William L. Simon
THE ART OF INTRUSION by Kevin Mitnick and William L. Simon

Comments

Popular posts from this blog

2 7 stable 9 vs TProxy on Ubnt

2 7 stable 9 vs TProxy on Ubnt Quote: idealnya proxy itu emang harus transparent. namun untuk squid2.7stable9 belum bener2 transparent. lah maksudnya transparent gimana? gini lho.. ketika client di bawah proxy request http yang masuk ke proxy kan ip client. trus yang keluar malah ip proxy. emang namanya transparent. cuman blom transparent menurut ane. kalo kita bikin proxy model gini dan mau limit traffic ya susah.. karena yang keluar dari proxy adalah ip proxy. bukan ip client. lah trus setelah pake TProxy hasilnya gimana? diharapkan setelah pake TProxy ip yang keluar dari proxy bener2 pure ip client. bukan proxy. jadi lebih mudah untuk management bandwidth. udah ngerti kan? (mudah2an blom) POC tweak dulo systemnya supaya traffic bisa lebih optimal Code: echo "*             soft    nofile          65535" >> /etc/security/limits.conf echo "* ...

15 Bishoujo Hyouryuuki Episode 01 Subtitle Indonesia

15 Bishoujo Hyouryuuki Episode 01 Subtitle Indonesia Admin Re-Hamatora Episode 01 Download FileTrip 12/09/2015 SUB StreamMoe 12/09/2015 SUB OpenLoad 12/09/2015 SUB U-Tube 12/09/2015 SUB

10 Gaming Gear Gak Penting Dengan RGB LED untuk Melengkapi Koleksimu

10 Gaming Gear Gak Penting Dengan RGB LED untuk Melengkapi Koleksimu Fenomena lampu RGB untuk produk-produk komputer bertema gaming kini tentunya semakin menjamur. Dengan berbagai merk yang tidak mau ketinggalan untuk memeriahkan pesta cahaya warna-warni untuk produk-produk yang dibuat oleh mereka. Mungkin pada awalnya tren ini hanya terjadi pada mouse, keyboard, dan kipas untuk case. Namun, dengan semakin  �hype�-nya  trend RGB ini penyematan lampu LED mulai menjalar ke perlengkapan lain mulai dari LED case, RAM, bahkan ke Motherboard. Bahkan, para produsen pun mulai menggila untuk menempatkan lampu LED ini ke barang-barang perlengkapan gaming lain yang bahkan terasa tidak penting. Berikut daftar 10 Gaming gear gak penting dengan RGB LED yang bisa kamu tambahkan untuk koleksimu. advertisement Gaming Guide: PC Awet Low Budget untuk eSports 1. Razer Firefly Daftar ini tentunya tidak akan afdol bila tidak dimulai dengan produk  Razer.  Salah satu merk yang ikut me...