The WHID Elite is an open-source, multi-purpose offensive device designed for cybersecurity professionals, penetration testers, and enthusiasts.
The WHID Elite offers a versatile platform for conducting various offensive security operations, including network penetration testing, social engineering, and physical security assessments.
Table of Contents
WHID Elite is a GSM-enabled Open-Source Multi-Purpose Offensive Device that allows a threat actor to remotely inject keystrokes, bypass air-gapped systems, conduct mousejacking attacks, do acoustic surveillance, RF replay attacks and much more. In practice, is THE Wet Dream of any Security Consultant out there!
Original Product Description
WHID Elite Features
- 2G/GSM Networks remote control
- Remote Audio surveillance
- Mouse-jacking Attacks
- RF Replay Attacks
- Remote HID Injection
- Weaponize USB Devices
Hardware Inside
- Microphone
- GSM SIM800L
- NRF24 Chip
- Battery Adapter
Hardware Needed
- WHID Elite
- Lipo Battery 1000mAh
- JST-PH 1.25 Connector
- 433 Mhz Modules TX/RX
- 2G/GSM SIM Card
2G / GSM Networks Remote Control
Remote Audio Surveillance
Mouse-jacking Attacks
Mouse-jacking attacks involve exploiting vulnerabilities in wireless mice and keyboards to intercept or inject keystrokes remotely. These attacks can be used by malicious actors to gain unauthorized access to systems, exfiltrate sensitive information, or execute arbitrary commands.
Similar to other wireless device attacks, mouse-jacking attacks highlight the importance of securing wireless communications and understanding potential security risks.
Hardware Implant Design
The WHID Elite is designed as a compact hardware implant that can be discreetly inserted into target systems or environments. Its small form factor and USB connectivity make it suitable for covert deployment in a wide range of scenarios.
Conclusion
In summary, the WHID Elite is a powerful and versatile offensive security tool that empowers cybersecurity professionals and enthusiasts to conduct targeted attacks and security assessments with ease. Its open-source nature, combined with its extensive feature set, makes it a valuable addition to any security toolkit.
However, it’s important to use such tools responsibly and ethically, respecting the privacy and security of others at all times.