SHARE
Facebook X Pinterest WhatsApp

Pwnie Express Intros Power Pwn Hacking Tool

Pwnie Express recently announced the upcoming release of the Power Pwn, a complete penetrating testing platform disguised as a surge protector. “The device is a $1,295 ‘penetration testing’ tool that will lodge remotely activated Wi-Fi, Bluetooth, and Ethernet attacks in an effort to identify network weaknesses,” writes The Verge’s Evan Rodgers. “A convenient web interface […]

Written By
thumbnail Jeff Goldman
Jeff Goldman
Jul 24, 2012
eSecurity Planet content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More

Pwnie Express recently announced the upcoming release of the Power Pwn, a complete penetrating testing platform disguised as a surge protector.

“The device is a $1,295 ‘penetration testing’ tool that will lodge remotely activated Wi-Fi, Bluetooth, and Ethernet attacks in an effort to identify network weaknesses,” writes The Verge’s Evan Rodgers. “A convenient web interface can be accessed through the unit’s built-in 3G radio or, failing that, commands can be sent directly to the device via text message.”

“The device is equipped to bypass NAC (Network Access Control) and other security measures designed to keep unauthorized devices off the network,” writes PCWorld’s Tom Bradley. “It can tunnel through application-aware firewalls, maintain a persistent, covert, encrypted connection to the attacker, and operate in a stealth mode that is unpingable and has no listening ports to avoid detection.”

“This Power Pwn was developed with money from a new DARPA (Defense Advanced Research Projects Agency) program called Cyber Fast Track, which is trying to jumpstart a new generation of cyber-defense tools,” writes Wired’s Robert McMillan. “‘It’s kind of taking the tools that the hackers are using and putting them in the hands of the people that need to defend against the hackers,’ [Pwnie Express CEO Dave] Porcello says.”

“A device like this might be created for penetration testers, but will surely also be used by hackers, as even [its] hefty price tag … is no longer a barrier for many of them,” notes Help Net Security’s Zeljka Zorz.

thumbnail Jeff Goldman

eSecurity Planet contributor Jeff Goldman has been a technology journalist for more than 20 years and an eSecurity Planet writer since 2009. He's also written extensively about wireless and broadband infrastructure and semiconductor engineering. He started his career at MTV, but soon decided that technology writing was a more promising path.

Recommended for you...

6 Open-Source Vulnerability Scanners That Actually Work
Chad Kime
Sep 5, 2025
Surfshark vs NordVPN (2025): Which VPN Wins? Full Breakdown
Matt Gonzales
Aug 14, 2025
The 5 Best VPNs for Small Businesses on a Budget
Matt Gonzales
Jul 16, 2025
Penetration Testing Phases: Steps, Tools & Methodology
Ray Fernandez
Jun 10, 2025
eSecurity Planet Logo

eSecurity Planet is a leading resource for IT professionals at large enterprises who are actively researching cybersecurity vendors and latest trends. eSecurity Planet focuses on providing instruction for how to approach common security challenges, as well as informational deep-dives about advanced cybersecurity topics.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.