SDR Security Analysis Tools

SDR-based cybersecurity analysis tools and related services.

Ikeriri Cyber ​​Security Penetration Test Equipment Sales Information

+ Penetration test equipment sales Service details

Ikeriri Network Service handles penetration testing equipment from the American company Hak5 and others. Many penetration testing devices, including Hak5, do not have an official distributor system. However, we believe that there are many customers who are unable to purchase from American companies or pay by credit card. The penetration testing equipment we sell is purchased and sold on behalf of the Self-Defense Forces, prefectural police, universities, and companies based on quotations and invoices. Therefore, the selling price and time may be higher than Hak5's list price. As a general rule, we do not accept transactions with individual customers for this equipment.

*The penetration testing equipment we sell is a device used to learn about attacks and countermeasures on a practical network for system protection education.Actually, attacks or hacking on the external Internet violates the Unauthorized Access Act, as well as criminal and civil laws, and may be punished.
This device will be used as a complement to our cybersecurity seminars, and will be used to learn about security attacks and how to defend against them. Please confirm and agree.
Programs and data used on devices include attack tools and malicious scripts. We do not distribute it for the purpose of attack or fraud. When taken home on a distributed DVD or distributed USB memory, it may be detected by anti-virus software when connected to the company network and copied, or it may cause problems unintentionally. Please handle with care.


Example of Hak5 penetration testing product

WiFi Pineapple MarkVII
WiFi Pineapple Mark 7 is a device that allows you to easily perform penetration tests such as wireless LAN packet capture, MITM, reconnaissance, and credential harvesting from the Web-UI using open source tools without having to prepare a separate wireless LAN card compatible with KaliLinux or aircrack-ng.

MarkVII Basic

Main specifications
2.4 GHz 802.11 b/g/n
(5 GHz/ac is optional)
Single Core MIPS SoC
256 MB RAM, 2 GB EMMC
3 high gain antennas
USB-C powered USB2 host port
Ethernet port
Cross-platform compatible
Win/Linux/Mac/Android/iOS

Main functions (common to NANO/TETRA)
packet capture
Access point search
Discovery of vulnerable devices
Frame insertion attacks (Deauth, etc.)
Creating a rogue AP
WPA2/3 (PSK/Enterprise) attack
MAC/SSID filter
Web interface
Cloud management compatible C2

WiFi Pineapple MarkVII ENTERPRIZE (Currently not on sale)
WiFi Pineapple Mark 7 Enterprise WiFi In addition to the basic functions of Pineapple MarkVII, it is a tool that is equipped with 2.4/5GHz 802.11a/b/g/n/ac /ac wave2 compatible memory and CPU enhancement, MIMO compatible Gigabit Ethernet, etc. You can use open source tools to perform penetration tests such as wireless LAN packet capture, MITM, reconnaissance, and credential harvesting without having to prepare a separate wireless LAN card compatible with KaliLinux or aircrack-ng.

WiFi Pineapple MarkVII Enterprise

Main specifications
2.4/5GHz 802.11a/b/g/n/ac
/ac wave2 compatible
Quad Core ARM SoC
1 GB RAM, 4 GB EMMC
4 MIMO-compatible 2:2 antennas
2 Gigabit Ethernet
USB-C Ethernet Port
USB 3 host ports
4 RGB LED AC power supply

WiFiPineApple
USB Rubber Ducky
USB Rubber Ducky is a USB memory-type penetration testing device that can perform keystroke insertion attacks. It can be programmed using a dedicated Ducky Script and can also be used as an RPA tool.
USBRubberDucky
Main specifications
USB Type A interface
60MHz 32-bit CPU
Micro SD slot
Payload replay button
disassembly case
Main features
keystroke insertion attack
Programming with Ducky Script
Numerous payloads available
(password capture, security information dump, etc.)

Bash Bunny
It is a penetration test device that has virtual Ethernet, virtual serial, virtual flash, virtual storage, and virtual keyboard on the USB device and can be treated like a Linux machine via USB-serial. BusyBunny is a device that can access connected computers and perform penetration tests such as acquiring data and installing backdoors.

BashBunny

Main specifications
Quad core ARM CPU
512MB RAM
8GB SSD
3 selector switches
multicolor led

Main features
Multiple payloads (data acquisition, backdoors, system intrusion)
Can handle multiple devices virtually
Ducky Script compatible nmap metasploit can be called
keystroke insertion attack
Packet Squirrel
Packet Squirrel is a pocket-sized Ethernet MITM penetration testing device. Equipped with a variety of open source Ethernet tools, you can operate remote access, packet capture, VPN connectivity, and more from the switch.
PacketSquirrel

Main specifications
Inline connectable RJ-45x2
USB-A port
microUSB power supply 5V120mA
4-way payload selection switch
Status LED
push button

Main features
MITM attack packet capture
Tunnel NAT processing with Open VPN
DNS spoofing attack
Supports capacity expansion with USB storage
Ducky Script compatible NAT, VPN, etc.
Cloud management compatible C2

LAN Turtle
LAN Turtle is a USB Ethernet adapter type penetration testing device. It is possible to perform MITM attacks on connected systems using remote access tools, or to connect as a springboard.

LANTurtle

Main specifications
USB-A port
USB power supply
RJ-45 port
Micro SD port (internal)

Main features
Packet Capture Spoofing VPN NAT
Check and select to configure and execute main modules
(nmap/openvpn/ptunnel/dns-spoof/meterpreter etc.)
Cloud management compatible C2
PLUNDER BUG LAN TAP
Plunder Bug LAN TAP is a simple inline LAN tap with USB-C connection. Compatible with Windows/Mac/Linux, it can be used as an inline connection or as a regular USB-C Ethernet adapter.
PlunderBug
Main specifications
10/100BASE-T FastEthernet
ASIX AX88772C chipset
USB-C tap and power
Compatible with Android (root required)
Compatible with Windows/Mac/Linux
Main features
Packet capture with inline connection (via USB-C)
Can also function as a standalone USB-C Ethernet adapter

SIGNAL OWL
SIGNAL OWL is a penetration testing device that can create a wireless LAN or Bluetooth capture/payload execution environment via USB connection. Equipped with two USB ports, you can connect GPS, SDR, and Bluetooth adapters.

SignalOwl

Main specifications
2x USB-A ports
11b/g built-in Wifi adapter
GPS/SDR/Bluetooth extension

Main features
Wireless LAN capture Access point detection
Supports aircrack-ng, MDK4, Kismet and other open source tools
Expand by connecting WiFi/GPS/SDR/Bluetooth adapters
Cloud management compatible C2

SCREEN CRAB
Screen Crub is a penetration testing device that tests MITM attacks on HDMI video. You can capture, stream, and save screenshots and videos from computers, monitors, and video output devices connected via HDMI.

ScreenCrab

Main specifications
HDMI port
microUSB power supply
Micro SD port
Operation LED/push button
wifi antenna

Main features
HDMI (FullHD 1080p) video capture and screenshots
Supports MicroSD (SDXC) for long-term recording
Storage rotation support
Online streaming compatible
Cloud management C2

SHARK JACK
SHARK JACK is a very small, battery-operated network investigation penetration testing device. It is equipped with a simplified version of nmap and can execute arbitrary payloads. You can also connect it to your PC and charge it using USB-C.

SharkJack

Main specifications
RJ-45 connector x1
RGB display LED slide SW
USB-C port
internal battery

Main features
Investigating the network with nmap (simple version)
Executing tests using scripting functionality
Connect and charge with PC via built-in storage and USB-C
Cloud management C2

KEY CROC
KEY CROC is a penetration testing device that is recognized as a HID device and can record keystrokes and perform keystroke insertion attacks. .

KeyCroc

Main specifications
Quad core ARM CPU
512MB RAM 8GB SSD
USB-A connector
USB-A port (HID)
Built-in 2.4GHz wireless LAN
Status LED button

Main features
Keystroke logging
New/old detection avoidance function using hardware ID clone
keystroke insertion attack
Connect via built-in WiFi
Payloads that can be pattern matched in a Ducky scripting environment
USB Virtual Ethernet Cloud Management C2

O.MG CABLE
At first glance, O.MG CABLE looks like a USB cable (Lightning/microUSB/USB-C) for smartphone connection, but it is a penetration test device with a built-in 2.4GHz wireless LAN. There is also a version with a USB-A port for development purposes. .

OMG Cable

Main specifications
Built-in WiFi (2.4GHz)
USB-A port/USB-C
Lightning/microUSB
USB-A connector (development version)

Main features
Connection via wireless LAN
Built-in web server
Android/iOS MITM
Payload insertion attack

OMG cable

Please inquire about other products.

 

Seminar networkproduct educationsupport Ikeriri