​10 gadgets every white hat hacker needs in their toolkit

How to conduct security audits and measure the technical assessment of a system or application.

Picture: Paul Sobczak (Flickr)

Picture: Paul Sobczak (Flickr)

A ‘white hat’ is an ethical computer hacker or cyber security expert. White hat hackers often conduct exploratory testing to ensure an organization or computer system is properly protected.

There are gadgets that can be used to conduct this type of hack, helping the white hat conduct security audits and measure the technical assessment of a system or application.

Most of this hardware was designed for security research or projects. Here are ten you might want to use as an ethical hacker.

1.Raspberry Pi 3

Third generation Raspberry Pis are now available. These low-budget computers can be simple and effective tools for online testing. In security audits, Raspberry Pi can act like a Swiss army knife for penetration testing (aka pen testing), carrying out controlled attacks in order to identify any vulnerabilities in the system. A classic way of using a Raspberry Pi would be with its appropriate battery pack, a pen testing distribution, likeKali Linux and applications like FruityWifi and open source tool to audit wireless networks.

2. WiFi Pineapple

This set of tools for wireless pen’ tests is very useful for various types of attacks, such as the classicMan-In-The-Middle. Through an intuitive web interface, it connects using any device. Its ease of use, workflow management, and the detailed information it provides offer the possibility of emulating different kinds of advanced attacks. As a platform, WiFi Pineapple also uses many modules, which are continually being developed by the user community, and can be installed free of charge directly via the web interface.

3. Alfa Network Board

As a classic WiFi board for injecting packets, the Alfa is great due to the quality of its materials, and for its use of chipsets which can be set to monitoring mode – a requirement for wireless audits.

4. Rubber Ducky

This “special” drive works as a programmed keyboard in the shape of a USB drive. When plugged into a computer, it starts writing automatically to launch programs and tools which may either be available on the victim’s computer, or loaded onto the drive's onboard Micro SD, in order to extract information.

5. LAN Turtle

This type of system admin and pen’ test tool provides stealthy remote access, as it stays connected to a USB port covertly. It also allows users to harvest information from the network and has the capacity to execute a Man-In-The-Middle attack.

6. HackRF One

This tool installs a powerfulSDR(Software-Defined Radio) system – a radio communication device which installs software to be used in place of typically installed hardware. This way, it is capable of processing all kinds of radio signals ranging from 10 MHz to 6 GHz from a single peripheral, which can be connected to the computer via a USB port. As an open source hardware platform, HackRF One can be used as a USB peripheral or programmed for stand-alone operation.

7. Ubertooth One

Ubertooth One is an open-source 2.4 GHz code development platform for experimenting with Bluetooth, enabling users to appreciate the different aspects of new wireless technologies.

8. Proxmark3 Kit

The Proxmark3 can read almost any RFID (radio frequency identification) label, as well as clone them and sniff them. It can also be operated in standalone mode (i.e. without a PC) through the use of batteries.

9. Lock picks

Lockpicking is the art of opening a lock or a physical security device by analysing or manipulating its components logically, without the original key. There are a many sizes and formats, which in many cases can threaten physical security, which can facilitate pen testing.

10. Keylogger

An old classic for logging keystrokes, this device can be connected via USB or PS/2 and create a stealthy connection between the keyboard and PC, logging every keystroke. Of course, it tends to go undetected by most security systems.

With this full list of devices, it may help and white hat hackers to finally have a point of entry to target something that seemed impenetrable before.

Lucas Paus is Senior Security Researcher at ESET

Join the PC World newsletter!

Error: Please check your email address.

Tags hackershacking exposedToolshackerhacking

Our Back to Business guide highlights the best products for you to boost your productivity at home, on the road, at the office, or in the classroom.

Keep up with the latest tech news, reviews and previews by subscribing to the Good Gear Guide newsletter.

Lucas Paus

PC World
Show Comments

Most Popular Reviews

Latest News Articles


PCW Evaluation Team

Azadeh Williams

HP OfficeJet Pro 8730

A smarter way to print for busy small business owners, combining speedy printing with scanning and copying, making it easier to produce high quality documents and images at a touch of a button.

Andrew Grant

HP OfficeJet Pro 8730

I've had a multifunction printer in the office going on 10 years now. It was a neat bit of kit back in the day -- print, copy, scan, fax -- when printing over WiFi felt a bit like magic. It’s seen better days though and an upgrade’s well overdue. This HP OfficeJet Pro 8730 looks like it ticks all the same boxes: print, copy, scan, and fax. (Really? Does anyone fax anything any more? I guess it's good to know the facility’s there, just in case.) Printing over WiFi is more-or- less standard these days.

Ed Dawson

HP OfficeJet Pro 8730

As a freelance writer who is always on the go, I like my technology to be both efficient and effective so I can do my job well. The HP OfficeJet Pro 8730 Inkjet Printer ticks all the boxes in terms of form factor, performance and user interface.

Michael Hargreaves

Windows 10 for Business / Dell XPS 13

I’d happily recommend this touchscreen laptop and Windows 10 as a great way to get serious work done at a desk or on the road.

Aysha Strobbe

Windows 10 / HP Spectre x360

Ultimately, I think the Windows 10 environment is excellent for me as it caters for so many different uses. The inclusion of the Xbox app is also great for when you need some downtime too!

Mark Escubio

Windows 10 / Lenovo Yoga 910

For me, the Xbox Play Anywhere is a great new feature as it allows you to play your current Xbox games with higher resolutions and better graphics without forking out extra cash for another copy. Although available titles are still scarce, but I’m sure it will grow in time.

Featured Content

Latest Jobs

Don’t have an account? Sign up here

Don't have an account? Sign up now

Forgot password?