A China-based female hacker who is in her twenties has managed to hide a pen-testing toolkit into her high-heeled plastic 3D printed shoes and has planned to invade large organizations by dodging strict security checks with her sensual looks.
Pen-tester and the hacker who uses her Reddit handle by the name of “SexyCyborg” has showcased her 3D printed high-heel shoes and codenamed it as “Wu Ying Shoes (无影鞋)” which means “shadowless”. Her invention is named after the folk hero Wong Fei Hung’s famous shadowless kick, which he used to distract his opponents.
Each shoe features a drawer that is easy to slide in and slide out without any need to take off the shoes, and since it is 3D printed so there are endless possibilities to customize the drawer to store different contents. These drawers can be used to conceal pen-testing toolkit from the prying eyes of the security guards.
For demonstration purpose, SexyCyborg designed a test version that features a complete set of penetration toolkit.
In the concealed compartment of the right shoe, she was able to store a TP-Link wireless router equipped with a built-in rechargeable battery that allows the router to be left operational inside the shoe for obvious hacking purposes like Wi-Fi sniffing or logging. The router can also be removed from the shoe and plugged-in to an open network jack to gain a remote access to the local area network (LAN) using SSH tunnel.
In the left shoe’s hidden compartment, she stored a number of tools. Including a USB keystroke recorder with a built-in memory that can be plugged-in to a targeted computer system to capture everything typed on the keyboard, a retractable Ethernet cable for the wireless router, a shim tool to open padlocks, and a simple lock picking set to gain access to file drawers or cabinets.
The hacker also posted some details about the router she used. It is a TP-Link TL-MR10U, which can be flashed to install OpenWRT firmware. Once it is flashed, you can easily run customized versions of various compatible software including Wispi,Jasager or Karma that allows you to set up a fake phishing login page to capture login credentials of the targeted employees.
“INSTALLING OPENWRT ON THE TL-MR10U IS JUST LIKE UPGRADING THE FIRMWARE ON ANY ROUTER. IT’S TWO LINKS AND A BUTTON- NOTHING TO IT. THERE’S A LOT OF DIFFERENT SOFTWARE YOU CAN RUN ONCE YOU HAVE OPENWRT FLASHED. THIS ROUTER MAY-OR-MAY-NOT BE RUNNING A CUSTOM VERSION OF WISPI FOR THE TP-LINK TL-MR10U BECAUSE IF IT WAS IT WOULD PROBABLY BE ILLEGAL IN CHINA SO MAYBE ITS NOT. BUT IF IT WAS I COULD RUN JASAGER/KARMA WHICH LETS YOU CAN FAKE BEING A FRIENDLY/KNOWN WIFI ACCESS POINT AND SETUP A FAKE LOGIN PAGE TO CAPTURE PASSWORDS, AMONG OTHER COOL TRICKS.”
The idea to integrate a penetration-testing toolkit into a shoe came into her mind when she thought about penetration testing on a corporate facility. But there were several limitations because usually the giant corporations don’t even allow their guests to take a cell phone into the secure building. So she decided to design high-heeled shoes with concealed compartments while her typical outfit doesn’t leave much room to hide anything, making her look less suspicious to the security guards.
“MY TYPICAL CLOTHING DOES NOT LEAVE ROOM TO HIDE ANYTHING- BUT THAT’S ALL THE MORE REASON THEY WOULD NOT BE SUSPICIOUS OF ME.”
SexyCyborg has even released the source files and blueprints for downloading for those hackers who are interested in 3D printing the shoes for themselves. She also added that the shoes are printed at 0.3mm so the layers are a little rough but heels are robust and safe enough to wear.