Hacking using hardware and software has no boundaries in fact successful attacks are quite commonly found to have been carried out by people who’s ages are barely in double figures. This section helps you to identify some of the tools that are readily available to you and hopefully will demonstrate the risks you face. It is not our intention to turn you all into dark side hackers but understanding how it all works will help prepare you should the worse happen and you yourself are the victim.
Here we go then, let’s start
Using USB devices
Human Interface Device’s (HID’s)
Hacking a mobile phone
The dangers when using public Wi-Fi