17 Hacker Tools in 7 Minutes - ALL Hak5 Gear
Вставка
- Опубліковано 21 тра 2024
- Find all the Hak5 pentest gear, videos, payloads & an awesome community at hak5.org
____________________________________________
Founded in 2005, Hak5's mission is to advance the InfoSec industry. We do this through our award winning educational podcasts, leading pentest gear, and inclusive community - where all hackers belong. - Наука та технологія
"involuntary backup" is underrated af 😂
Very handy in case of a randomware attack ;)
@@krem2335woosh
You guys got me interested, again, in computer science and offensive security.
Thanks for all you do!
what do you do?
I’d look into emissions security if u can’t detect covert comms using emissions then u mind as well not even try
Keep in mind these are all commercial products, You can make your own free (or close to it if you buy the raw hardware) versions just as easily, no reason to go out and buy a pineapple if all you're trying to do is learn. Surprised so much of his kit is out of the box and not as custom, most people I know find the commercial products while great, usually have certain limitations.
In 1986, Congress passed the Computer Fraud and Abuse Act (CFAA), now codified under Title 18 U.S. Code § 1030.
This law makes it a federal crime to gain unauthorized access to “protected” computers (otherwise known as “hacking”) with the intent to defraud or do damage.
No everyone lives in the USA @@robhill8894
@@robhill8894and?
@robhill8894 it's a good thing criminals care about laws, tho😊
@@robhill8894there are many things that are illegal that are still done. Most of the crime is committed by your very own government. So why not be a step or two ahead of them?
From watching you guys live stream in 2005 at the old house with Matt, to what it is now is amazing
It's crazy how fast time goes by.
Seems like just yesterday I was watching hak5 on tech TV.
@@atheistmecca971 That's right I totally forgot about that!
Thank you so much for taking the time out to put up this kind of information. This was definitely needed. I have projects coming up so this is a plus to be marketable.
Awesome update love everything, still have my 1st rubber ducky, I need to add a few new items to the Christmas list, Cheers mate 👍
I've been watching since 2005
Darren and Wes raised my curiosity with Gentoo and compiling my own kernel
From there I was off to the races with a beer in hand
I am still going but without the beer Cheers brother
This is what we needed 🎉Thank you ❤❤❤
In 1986, Congress passed the Computer Fraud and Abuse Act (CFAA), now codified under Title 18 U.S. Code § 1030.
This law makes it a federal crime to gain unauthorized access to “protected” computers (otherwise known as “hacking”) with the intent to defraud or do damage.
Darren is a mad dog; Love your business brother!
This video is going to be invaluable to all the cyber professionals who didn't save the pamphlets and have no idea what half the stuff is anymore.
No way you can keep up 100%, tech and info is changing every day so fast.
Who shared this video, you are such a great man You are the best of the best .
You saved my life from hacker .
Thank you so much. 🙏🏼😊
I love this channel! 😈
Fuck bro, you have been doing this for a long time. I remember listening to your podcast years and years ago. Respect.
Great video
nice change of pace ! :D
Thank you. Fantastic stuff.
So crazy to me. I remember watching the first Hak5 episode and following y'all religiously for years. Damn, we're old asf.
I remember a particular wifi at a Starbucks. Good times.
You can make ALL of these tools yourself and you’ll gain A TON of knowledge doing it.
Love it!
Keep up the good work 💪
Just in time for Christmas
I need to do some shopping 😅 thanks for sharing
Sometimes these kind of videos teach you more then an hour long lecture video.
Great stuff!
Kind of crazy how an employee can accidentally find a USB stick and innocently connect it to their work computer to check what it is. When I used to work at a bank that is why USB sticks are banned and all the computer USB ports does not work and is disabled. Now I have to lock down everything at home so the kids don't get their computers infected or hacked.
Wow 😎 nice tools
involuntary backup!! hahahaha. thats great dude!
Awesome gear
Our very own Q from James Bond
As a lifelong 007 fan, I am quite honored to receive this comment. Thank you :)
kinda random question, can I do with this payload usb a/c sticks, just put a script on so it installs all necessary software and does wind. updates etc?
4:20 Love the Hackers movie reference
Bro sells problem and solution together, Malicious Cable and Detector 🤣🤣🤣
Wow good vidéo i hope one day i get to you're level of knowledge🤖
Hi Darren, this may sound strange but, any chance you can do a quick video on the correct way to Shutdown the Pineapple Mark VII please. Installed mine tonight and could not find anything in the online documentation on the shutdown process. I was running it off an external battery so I just Logged Out and pulled out the battery.
Thanks
Maliciuos cables is something i never thought i hear
This is so intriguing...😊😊😊
I love how these simple looking devices are so we'll described in how they can be weaponized by anyone tech savvy to intrude networks or systems.
could you guys make an more in depth video of the pineapple? i'd sometimes think to myself I should get one? but then i'm thinking well hat can it do more the a flipper zero with the wifi devboard? would be nice to hear it from the experts themself
An easy way to think of it is that a Pineapple can pretend to be a real Wi-Fi, tricking devices and launching attacks. A Flipper can only really scout out networks and disrupt them. Although it can create networks, any user that joins won't be able to access the internet as it's just not built for that.
Both are great tools in their own respect, but it's like comparing a swiss army knife to a machete.
I want all of theseeee 😫😫
If a want to stole info with a pendrive what do you suggest to buy? Thankz
Are any skills needed to use omg cable? Is there a userfriendly software?
Dang Darren you just put up our Christmas wish-list.!
Hilarious delivery
Congratulation 🥳
When will the Coconut be back in stock?
I still have my 1st rubber ducky from your initial launch 😂 love that little guy.
Wild stuff
Take our money 💰 we’ve come a lonnnnnnnng way from BackTrack
Nice 🤝
Great gear but I really miss when you used to do regular hacking videos.
I have to second this. 100% agree with putting food on the table but I miss when you were teaching 10 year old me how to hack and crack for free at home in safe and legal ways
Soon... 😉
does those tools also works on phones?
What's the difference between wifi pineapple mark 7 and wifi pineapple enterprise? And what's the solution for that a homemade router with a "homemade" program?
Nice
My mouth is drooling. lol@involuntary backup.
Hak5 4Life
What about tracking? Most UA-camrs don't even mention this topic. The footprints are the most important thing.
What about self-deletion as soon as a USB device is removed from Hak5. E.g. a hidden device (long-term) on the projector. Is there a standard setting for this?
The most complicated thing, how safe is to buy those tools?
Thanks
for a real world pentest, how useful is the pineapple anymore now that HTTPS is ubiquitous for pretty much any and all website traffic that 'matters'? what data is really gathered with the device that would be damaging, disruptive, or cause an audit failure for either businesses or resident/individuals?
Snooping on HTTP is only one of the myriad of attack vectors. Personally, I find captive portals to be highly effective at collecting credentials and other PII - especially with realistic looking phishing pages. Many operating systems don't even show the URL of the portal, so it only has to "look the part". Then there's DNS spoofing as part of a greater phishing campaign, DoS attacks, WPA handshake captures for password cracking -- especially when coupled with deauthentication attacks, denial of certain protocols (what do most folks do when the VPN "just won't connect"). Both pineapples can be used for enterprise-WPA evil twin attacks. The Enterprise makes a great platform for lateral movement within a network when coupled with C2. Of course testing access points/base stations for vulnerabilities & misconfigurations (e.g. WPS) is a must, and one place it shines where other tools fail to check is testing clients/stations for misconfigurations (e.g. PNL leakage / susceptibility to rogue access points in general). TLS and HSTS are great - but I wouldn't just blindly trust this best-effort protocol.
Wow. It redefines my view on cybersecurity.
Why can't people purchase the Kismet Case Mod any longer?
Good morning, I was browsing through UA-cam and I came across this video. After being hacked three different times, And I'm pretty sure it happened while or through Facebook. And it always on the 3rd of the month because that's the day that I received my Social Security Disability payment, wiping me out. Is there anything that I can do to prevent this?
Good morning,
Most likely it's a relativ robbing you...
Change all your password a activate 2FA on Facebook
@Hak5 I need this stickers 😍
thanks
will be more better if u list all the hack5 products and where to buy them
Do u ship theese products in India it's demanding in india
You can make pretty much all of these yourself and you’ll learn A TON doing it. I’m building a pineapple out of my dads old router that I found in the basement.
How can I get in touch with you
It's Darren! We missed you!
Darren still hacking? Good stuff
Till the 🐄🐄🐄come home
I have an old pineapple and a ducky without its shell .. great stuff .. always want a squirrel but never could afford it .. but fun people making fun things is fun
Want to do a new tutorial "playlist" with wifi pineapple nano/mk7
As a student are these devices okay to test on my home systems?
Why wouldn't they be? Your property is your property. No one can tell you what to do or not to do with your property.
@@ethanrandall3005 Sorry, I should’ve said safe not okay.
You can't have as much fun as you used to since a lot of the companies have caught on and things like rogue Ap are detected now by apple. Haven't t2sted it recently but I got a notice last time I checked it said Rogue AP warning
I need a malicious cable detector that also a rubber ducky
or only on pc`s?
Love
God damn it i was sure i had tge bright idea for the screen crab had it years agi actually when watching netflix over discord was a thing
Literally the reason we use Crowdstrike, and have all Bluetooth and USB devices blocked according to the type of device that’s being used, it’s literally the best defensive security software suite that exists
Yeah, there are other attacks like Thunderspy which won't be blocked by such software. Physical access is all it needs.
If you think Crowdstrike will protect you, you're a sucker.
So what happens when a USB device lies about what it is? - not sure what it is currently. But 15 years ago, almost every business used the same dell keyboard. I always considered it insecure and a bit strange.
@@pragmaticperson7127Their repetitive misuse of literally says it all.
@@goat-eyeslol. fax.(kidding)
nice
hi, and hmm suppose I want to monitor a cell phone. I know the # and the base location- where he lives. What is available to do that?
Bro your joking💀
We miss Snubs, get her back Darryl
thats crazy
Must watch and buy come 2024
Im on a mission to own all Hak5 products
can the packet squirrel exploit a printer?
Hi. I have tried many times to buy some products from website and all the time my orders was canceled. so, please help to buy your products... I have written many times messages to your support team but I have got only automatic messages which says I have different address and so on problems... so, please let me know how to get touch you in person by phone or something like that... I am planning to buy 26 pcs of different products but no success... wait for reply.
Collecting hak5 gadgets is my dream. But I know its not possible for me 😢
ended up finding out about these because there was a sticker of the wifi pineapple on my pc i bought on ebay
Like! !لایک
do you plan any good discounts on all those?
In 1986, Congress passed the Computer Fraud and Abuse Act (CFAA), now codified under Title 18 U.S. Code § 1030.
This law makes it a federal crime to gain unauthorized access to “protected” computers (otherwise known as “hacking”) with the intent to defraud or do damage.
Damn those cables are scary. Imagine replacing a few dozen cables in loose packaging in a walmart or gas station.
Yeah, I'm never buying cheap charging cables again
Man what's that WORLD!
Hit the like button faster than you can say Worcestershire sauce.
Fun :)
its expensive as hell brooooo
Cool stuff to get started and learn but I don't want to be a script kiddie for the rest of my career. I want to make my own stuff and do my own code. Obviously the cables are a different story but everything else can be made or done on my own. The question is, where do I start?
Someone tried to use a shark jack years ago on a network I managed. It was useless hahaha.
This video is going to land me in a jail
Just take all my money now