Oh, there's so much more... Rubber duckies, network/bluetooth sniffing and spoofing, metasploit, sqli, and most importantly: social engineering.
You can find a lot of videos on YouTube and elsewhere that go into technical detail about how this stuff works and how to pull it off. Here's a good series:
I am thinking to do a follow up post where I briefly touch on more of them. Thank you!
reply