Ethical Hacking: How Hackers Uses DigiSpark to Hack Any PC

  • Overview
  • Curriculum
  • Instructor
  • Review

About This Course

Learn How to Use MicroController in Real World Hacking Scenario

Learn How to Use MicroController in Real World Hacking Scenario

If you remember the scene from Mission Impossible 4 at Burj Khalifa in which Benji ask agent Ethan Hunt that they can not hack burj khalifa server room from inside. The only way to reach the server room is by climbing over the walls of the Burj and placing some hardware that contains malware and inserting it into the server. We going to see how we can create that hardware.

In this Course I’m going to show you how we can use tiny 1$ microcontroller to hack any PC on your local network as well as anywhere in the world using public IP.

This Microcontroller is called DigiSparkIt is a microcontroller based on Attiny85 development board. It is similar to Arduino but smaller and more powerful in terms of hacking.

  • What is DigiSpark

  • DigiSpark Programming

  • How DigiSpark can be used in Hacking

Instructors

Profile photo of Arsalan Saleem
Arsalan Saleem

I'm a Security Expert and Software Developer with 7+ years experience. I love to work on innovative offensive security ideas. I have developed many web application and mobile applications. I have also worked on security of many industrial software's. Currently I'm working on exploit research and use of deep learning with micro controllers in Penetration Testing.

Instructors

Profile photo of Secure Techware
Secure Techware

SecureTechware believes in the philosophy of innovation for serving the employees, clients and the community effectively. We believe in quality and reliability in order to deliver superior services. Whether it is new development, update or maintenance; our company has a potential to provide the best!Our vision is to be the innovation leader in the I.T. services. We are determined to...

Review
4.9 course rating
4K ratings
ui-avatar of Juthawong Naisanguansee
Juthawong N.
5.0
2 years ago

Short and straight forward

  • Helpful
  • Not helpful
ui-avatar of Angela Kim López
Angela K. L.
5.0
4 years ago

Well, it's a short course, but the information is very valuable, Thanks ... =*

  • Helpful
  • Not helpful
ui-avatar of C Mac
C M.
1.0
4 years ago

Bad sound quality and outdated material.

  • Helpful
  • Not helpful
ui-avatar of Avi K
Avi K.
4.5
5 years ago

need more

  • Helpful
  • Not helpful
ui-avatar of Fadhel
Fadhel
5.0
5 years ago

Great Instructor, fast, easy
I hope u make lecture about C programming language for hardware, for ethical hacking stuff.
Thanks a lot.

  • Helpful
  • Not helpful
ui-avatar of Ayesha Zaman
Ayesha Z.
5.0
5 years ago

good

  • Helpful
  • Not helpful
ui-avatar of Jibran Ali
Jibran A.
5.0
5 years ago

good

  • Helpful
  • Not helpful
ui-avatar of Ayaz Khan
Ayaz K.
5.0
5 years ago

this course gives me new ideas in pen.testing

  • Helpful
  • Not helpful
ui-avatar of David Sopas
David S.
2.5
5 years ago

I have a few points regarding this course.
» Video 10 - The author forgot to add KEY_ENTER on the digispark script and its clear that he hits enter when the script stops on the powershell console;
» Video 12 - Sound is really bad. Seems recorded on a bunker or something;
» Video 13 - Well Post exploitation using Meterpreter is just showing help, dir files and downloading files. If the author wanted to keep it simple he could do screenshot or even mapping the network.

I think the course is average and didn't learn nothing new. By the way, is totally out-dated. Default AV will trigger on Veil. Try using Empire.

  • Helpful
  • Not helpful
ui-avatar of SemiaAli
Semiaali
5.0
5 years ago

well presented !

  • Helpful
  • Not helpful
Leave A Reply

Your email address will not be published. Required fields are marked *

Ratings

Courses You May Like

Lorem ipsum dolor sit amet elit
Show More Courses