{"id":10679,"date":"2022-07-08T02:30:27","date_gmt":"2022-07-08T02:30:27","guid":{"rendered":"https:\/\/conference.hitb.org\/hitbsecconf2023hkt\/?post_type=session&#038;p=10679"},"modified":"2023-05-26T01:55:57","modified_gmt":"2023-05-26T01:55:57","slug":"how-to-design-your-own-electronic-attack-device","status":"publish","type":"session","link":"https:\/\/conference.hitb.org\/hitbsecconf2023hkt\/session\/how-to-design-your-own-electronic-attack-device\/","title":{"rendered":"How to Design Your Own Electronic Attack Device"},"content":{"rendered":"<p style=\"text-align: justify;\">Many security attacks and tests are hardware-related. For example, using a portable small computer for network attacks, using a Wi-Fi card with monitor mode for Wi-Fi cracking, using a BadUSB device to gain target privileges, or using a phishing Wi-Fi to steal passwords.<\/p>\n<p style=\"text-align: justify;\">These attack methods are usually effective, but there are two problems: they are always bulky, often requiring several devices to work together. For example, if we want to carry out a Wi-Fi-based attack, we need to carry a Raspberry Pi, a wireless card, a power bank, and a bunch of cables.<\/p>\n<p style=\"text-align: justify;\">Another problem is that these devices are usually expensive commercial products, but they cannot meet our personalized needs. For example, we need a small computer with lower power consumption and a built-in battery but fewer interfaces. Or we want to use a more powerful sniffing network card with the WiFi Pineapple device, or we want the attack device to have a 4G remote control module.<\/p>\n<p style=\"text-align: justify;\">In short, many devices are not specifically designed for security workers, but these security workers often have many interesting ideas. Real hackers should not just buy assembled products or only know how to solder a badge that lights up.<\/p>\n<p style=\"text-align: justify;\">The future trend may be software-defined everything. Software-defined radio, software-defined network, and in the future, there should be <strong>software-defined hacker equipment. <\/strong>Hackers only need to connect and combine processors, storage, and various sensors in software based on their needs, similar to building blocks, to create futuristic hacker attack devices like the ones used by James Bond in the 007 movies.<\/p>\n<p style=\"text-align: justify;\">In this session, I will show you:<\/p>\n<ul style=\"text-align: justify;\">\n<li>How to design and make your own attack device circuit board through circuit design, including how to design a Raspberry Pi carrier board with USB port and charging module<\/li>\n<li>How to design a Wi-Fi attack device with an ESP32 module<\/li>\n<li>How to design a USB protocol sniffing and analysis device through proprietary chips<\/li>\n<li>How to design a complete Linux system circuit board, and how to create your ultimate attack device on this circuit board.<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p style=\"text-align: justify;\"><strong>The above might sound daunting and difficult to pull off, but trust me, after this talk, you&#8217;ll be able to create your own novel and interesting attack device!<\/strong><\/p>\n<p>&nbsp;<\/p>\n","protected":false},"template":"","class_list":["post-10679","session","type-session","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.3 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>How to Design Your Own Electronic Attack Device - HITBSecConf2023 - Phuket<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/conference.hitb.org\/hitbsecconf2023hkt\/session\/how-to-design-your-own-electronic-attack-device\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How to Design Your Own Electronic Attack Device - HITBSecConf2023 - Phuket\" \/>\n<meta property=\"og:description\" content=\"Many security attacks and tests are hardware-related. For example, using a portable small computer for network attacks, using a Wi-Fi card with monitor mode for Wi-Fi cracking, using a BadUSB device to gain target privileges, or using a phishing Wi-Fi to steal passwords. These attack methods are usually effective, but there are two problems: they [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/conference.hitb.org\/hitbsecconf2023hkt\/session\/how-to-design-your-own-electronic-attack-device\/\" \/>\n<meta property=\"og:site_name\" content=\"HITBSecConf2023 - Phuket\" \/>\n<meta property=\"article:modified_time\" content=\"2023-05-26T01:55:57+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/conference.hitb.org\/hitbsecconf2023hkt\/session\/how-to-design-your-own-electronic-attack-device\/\",\"url\":\"https:\/\/conference.hitb.org\/hitbsecconf2023hkt\/session\/how-to-design-your-own-electronic-attack-device\/\",\"name\":\"How to Design Your Own Electronic Attack Device - HITBSecConf2023 - Phuket\",\"isPartOf\":{\"@id\":\"https:\/\/conference.hitb.org\/hitbsecconf2023hkt\/#website\"},\"datePublished\":\"2022-07-08T02:30:27+00:00\",\"dateModified\":\"2023-05-26T01:55:57+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/conference.hitb.org\/hitbsecconf2023hkt\/session\/how-to-design-your-own-electronic-attack-device\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/conference.hitb.org\/hitbsecconf2023hkt\/session\/how-to-design-your-own-electronic-attack-device\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/conference.hitb.org\/hitbsecconf2023hkt\/session\/how-to-design-your-own-electronic-attack-device\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/conference.hitb.org\/hitbsecconf2023hkt\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Session\",\"item\":\"https:\/\/conference.hitb.org\/hitbsecconf2023hkt\/session\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"How to Design Your Own Electronic Attack Device\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/conference.hitb.org\/hitbsecconf2023hkt\/#website\",\"url\":\"https:\/\/conference.hitb.org\/hitbsecconf2023hkt\/\",\"name\":\"HITBSecConf2023 - Phuket\",\"description\":\"August 22 - 26 @ InterContinental\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/conference.hitb.org\/hitbsecconf2023hkt\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How to Design Your Own Electronic Attack Device - HITBSecConf2023 - Phuket","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/conference.hitb.org\/hitbsecconf2023hkt\/session\/how-to-design-your-own-electronic-attack-device\/","og_locale":"en_US","og_type":"article","og_title":"How to Design Your Own Electronic Attack Device - HITBSecConf2023 - Phuket","og_description":"Many security attacks and tests are hardware-related. For example, using a portable small computer for network attacks, using a Wi-Fi card with monitor mode for Wi-Fi cracking, using a BadUSB device to gain target privileges, or using a phishing Wi-Fi to steal passwords. These attack methods are usually effective, but there are two problems: they [&hellip;]","og_url":"https:\/\/conference.hitb.org\/hitbsecconf2023hkt\/session\/how-to-design-your-own-electronic-attack-device\/","og_site_name":"HITBSecConf2023 - Phuket","article_modified_time":"2023-05-26T01:55:57+00:00","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/conference.hitb.org\/hitbsecconf2023hkt\/session\/how-to-design-your-own-electronic-attack-device\/","url":"https:\/\/conference.hitb.org\/hitbsecconf2023hkt\/session\/how-to-design-your-own-electronic-attack-device\/","name":"How to Design Your Own Electronic Attack Device - HITBSecConf2023 - Phuket","isPartOf":{"@id":"https:\/\/conference.hitb.org\/hitbsecconf2023hkt\/#website"},"datePublished":"2022-07-08T02:30:27+00:00","dateModified":"2023-05-26T01:55:57+00:00","breadcrumb":{"@id":"https:\/\/conference.hitb.org\/hitbsecconf2023hkt\/session\/how-to-design-your-own-electronic-attack-device\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/conference.hitb.org\/hitbsecconf2023hkt\/session\/how-to-design-your-own-electronic-attack-device\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/conference.hitb.org\/hitbsecconf2023hkt\/session\/how-to-design-your-own-electronic-attack-device\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/conference.hitb.org\/hitbsecconf2023hkt\/"},{"@type":"ListItem","position":2,"name":"Session","item":"https:\/\/conference.hitb.org\/hitbsecconf2023hkt\/session\/"},{"@type":"ListItem","position":3,"name":"How to Design Your Own Electronic Attack Device"}]},{"@type":"WebSite","@id":"https:\/\/conference.hitb.org\/hitbsecconf2023hkt\/#website","url":"https:\/\/conference.hitb.org\/hitbsecconf2023hkt\/","name":"HITBSecConf2023 - Phuket","description":"August 22 - 26 @ InterContinental","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/conference.hitb.org\/hitbsecconf2023hkt\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/conference.hitb.org\/hitbsecconf2023hkt\/wp-json\/wp\/v2\/session\/10679"}],"collection":[{"href":"https:\/\/conference.hitb.org\/hitbsecconf2023hkt\/wp-json\/wp\/v2\/session"}],"about":[{"href":"https:\/\/conference.hitb.org\/hitbsecconf2023hkt\/wp-json\/wp\/v2\/types\/session"}],"wp:attachment":[{"href":"https:\/\/conference.hitb.org\/hitbsecconf2023hkt\/wp-json\/wp\/v2\/media?parent=10679"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}