$60+
Add to cart

The Outlet Spy: Build Network Taps That Look Like Wall Chargers

$60+

THE OUTLET SPY: Network Tap Construction Guide

A complete technical manual for building covert network monitoring devices disguised as USB wall chargers


What You're Getting

This isn't a theory document. This is a complete, actionable blueprint for constructing professional-grade network taps that hide inside standard USB charger housings. Seven comprehensive chapters spanning 40+ pages of technical documentation with the aesthetic of a leaked classified document.

Included:

  • Complete bill of materials with exact part numbers and suppliers
  • Step-by-step PCB design and assembly instructions
  • Firmware architecture for both embedded and SBC approaches
  • Physical installation procedures and OPSEC guidelines
  • PCAP analysis techniques and data exfiltration methods
  • Comprehensive troubleshooting section with failure mode analysis
  • Schematic diagrams and signal path documentation

Who This Is For

Security Professionals: Red team operators, penetration testers, and security researchers conducting authorized assessments. This guide provides the technical depth needed for professional deployments.

Electronics Enthusiasts: Hardware hackers, makers, and embedded systems developers interested in advanced Ethernet interfacing, passive signal monitoring, and miniaturized electronics design.

Network Engineers: IT professionals building network monitoring infrastructure, honeypots, or internal security auditing systems for their own networks.

Academic Researchers: Students and faculty studying network security, traffic analysis, or electronic surveillance countermeasures.


Technical Specifications

The devices described in this guide achieve:

  • Gigabit throughput (10/100/1000 Mbps) with zero detectable latency
  • Passive transformer coupling for complete electrical invisibility
  • Professional form factor using genuine charger housings
  • Local or remote exfiltration via microSD logging or WiFi
  • Full PCAP capture with microsecond-precision timestamps

What Makes This Guide Different

Most network tap documentation falls into two categories: overpriced commercial products with proprietary designs, or vague hobbyist projects that skip critical details. This guide bridges that gap.

You get:

  • Real component selections with justifications (not generic "use a PHY chip")
  • Actual PCB layout considerations for high-speed differential signaling
  • Firmware implementation details for both STM32 and Raspberry Pi
  • Physical deployment tradecraft including reconnaissance and retrieval protocols
  • Forensic countermeasures and anti-detection techniques

The writing style mimics leaked technical intelligence—dense with specific detail, formatted like classified material, complete with "burn after reading" aesthetics.


Required Skills & Tools

Minimum Experience Level: Intermediate

You should be comfortable with:

  • Basic electronics (reading schematics, using a multimeter)
  • Soldering (surface-mount components preferred but not required)
  • Command-line interfaces (for firmware configuration)
  • Network fundamentals (Ethernet, TCP/IP, PCAP analysis)

Tools Required:

  • Soldering iron and basic electronics tools
  • Multimeter
  • Access to PCB fabrication service (or willingness to order online)
  • Computer for firmware development

Budget: $90-140 for first prototype, including all components and tools


Legal & Ethical Use

READ THIS CAREFULLY:

This guide is provided for educational and authorized security research purposes only. The construction and deployment of network interception devices without explicit written authorization violates federal wiretapping laws and computer fraud statutes in virtually every jurisdiction.

Legal use cases include:

  • Authorized penetration testing with signed contracts
  • Personal network security auditing (your own network)
  • Academic research in controlled laboratory environments
  • Security product development and testing

The guide includes extensive legal disclaimers and repeatedly emphasizes the importance of authorization. It also discusses operational security, forensic countermeasures, and detection avoidance—not to enable criminal activity, but to educate security professionals on both offensive and defensive techniques.

By purchasing this guide, you agree to use the information responsibly and in accordance with all applicable laws.


Content Preview

Chapter Breakdown:

  1. Overview - Threat model, capabilities, design philosophy
  2. Theory - Ethernet physical layer, transformer coupling, signal integrity
  3. Components - Complete BOM with part numbers, costs, and sourcing
  4. Build Process - PCB design, assembly, firmware, housing integration
  5. Installation - Deployment procedures, reconnaissance, concealment techniques
  6. Operation - Data collection, PCAP analysis, remote exfiltration
  7. Troubleshooting - Common failures, diagnostic procedures, fixes

Format & Delivery

  • File Type: Single HTML file (works offline, no installation required)
  • Compatibility: Any modern web browser (Chrome, Firefox, Safari, Edge)
  • Page Count: 40+ pages of technical documentation
  • Interactive: Multi-page navigation with smooth transitions
  • Printable: Yes, though digital format recommended for reference

Support & Updates

This is a living document. As component availability changes or new techniques emerge, the guide will be updated. All purchasers receive free updates.

Questions? Concerns? Contact via Gumroad messaging. While I can't provide personalized hardware debugging (liability reasons), I'm happy to clarify documentation or discuss alternative approaches.


Final Notes

This guide represents hundreds of hours of research, prototyping, and documentation. The information inside isn't available in this form anywhere else—it's compiled from academic papers, datasheets, security conference presentations, and hands-on experimentation.

If you're serious about network security, hardware hacking, or understanding how covert monitoring works (either to deploy it ethically or defend against it), this guide delivers.

Purchase includes immediate download. No DRM. Keep forever.


Disclaimer: The author assumes no liability for misuse of this information. All techniques described are dual-use technologies with legitimate applications in security research and illegitimate applications as surveillance tools. Use responsibly and legally.

$
Add to cart

You'll get a detailed and actionable tried and true guide on how to craft your very own of these devices.

Size
52.4 KB
Powered by