Oh, there's so much more... Rubber duckies, network/bluetooth sniffing and spoofing, metasploit, sqli, and most importantly: social engineering.
You can find a lot of videos on YouTube and elsewhere that go into technical detail about how this stuff works and how to pull it off. Here's a good series: https://www.youtube.com/watch?v=3yiT_WMlosg
I am thinking to do a follow up post where I briefly touch on more of them. Thank you!
reply
Password brute forcing also. Never saw it in the show Hashcat, Johntheripper
reply