Keep in mind these are all commercial products, You can make your own free (or close to it if you buy the raw hardware) versions just as easily, no reason to go out and buy a pineapple if all you're trying to do is learn. Surprised so much of his kit is out of the box and not as custom, most people I know find the commercial products while great, usually have certain limitations.
In 1986, Congress passed the Computer Fraud and Abuse Act (CFAA), now codified under Title 18 U.S. Code § 1030. This law makes it a federal crime to gain unauthorized access to “protected” computers (otherwise known as “hacking”) with the intent to defraud or do damage.
@@robhill8894there are many things that are illegal that are still done. Most of the crime is committed by your very own government. So why not be a step or two ahead of them?
I've been following you guys off and on for many years. You have helped me and my company a lot, although I'm not near where I need to be in the smarts, I learn something new every time I watch your videos. Thank you so much.
I've been watching since 2005 Darren and Wes raised my curiosity with Gentoo and compiling my own kernel From there I was off to the races with a beer in hand I am still going but without the beer Cheers brother
Thank you so much for taking the time out to put up this kind of information. This was definitely needed. I have projects coming up so this is a plus to be marketable.
Kind of crazy how an employee can accidentally find a USB stick and innocently connect it to their work computer to check what it is. When I used to work at a bank that is why USB sticks are banned and all the computer USB ports does not work and is disabled. Now I have to lock down everything at home so the kids don't get their computers infected or hacked.
The way they're simplifying the research process excites me. reminds me of the collaborative AI agents being used by SmythOS to revolutionize corporate operations.
Hi Darren, this may sound strange but, any chance you can do a quick video on the correct way to Shutdown the Pineapple Mark VII please. Installed mine tonight and could not find anything in the online documentation on the shutdown process. I was running it off an external battery so I just Logged Out and pulled out the battery. Thanks
kinda random question, can I do with this payload usb a/c sticks, just put a script on so it installs all necessary software and does wind. updates etc?
could you guys make an more in depth video of the pineapple? i'd sometimes think to myself I should get one? but then i'm thinking well hat can it do more the a flipper zero with the wifi devboard? would be nice to hear it from the experts themself
for a real world pentest, how useful is the pineapple anymore now that HTTPS is ubiquitous for pretty much any and all website traffic that 'matters'? what data is really gathered with the device that would be damaging, disruptive, or cause an audit failure for either businesses or resident/individuals?
Snooping on HTTP is only one of the myriad of attack vectors. Personally, I find captive portals to be highly effective at collecting credentials and other PII - especially with realistic looking phishing pages. Many operating systems don't even show the URL of the portal, so it only has to "look the part". Then there's DNS spoofing as part of a greater phishing campaign, DoS attacks, WPA handshake captures for password cracking -- especially when coupled with deauthentication attacks, denial of certain protocols (what do most folks do when the VPN "just won't connect"). Both pineapples can be used for enterprise-WPA evil twin attacks. The Enterprise makes a great platform for lateral movement within a network when coupled with C2. Of course testing access points/base stations for vulnerabilities & misconfigurations (e.g. WPS) is a must, and one place it shines where other tools fail to check is testing clients/stations for misconfigurations (e.g. PNL leakage / susceptibility to rogue access points in general). TLS and HSTS are great - but I wouldn't just blindly trust this best-effort protocol.
In 1986, Congress passed the Computer Fraud and Abuse Act (CFAA), now codified under Title 18 U.S. Code § 1030. This law makes it a federal crime to gain unauthorized access to “protected” computers (otherwise known as “hacking”) with the intent to defraud or do damage.
What devices should I look into to get .. I've been cyber stalked and electronicly and Harassed for two years by police informants in Chicago... How can I protect myself and my Fiance and family
What's the difference between wifi pineapple mark 7 and wifi pineapple enterprise? And what's the solution for that a homemade router with a "homemade" program?
Literally the reason we use Crowdstrike, and have all Bluetooth and USB devices blocked according to the type of device that’s being used, it’s literally the best defensive security software suite that exists
So what happens when a USB device lies about what it is? - not sure what it is currently. But 15 years ago, almost every business used the same dell keyboard. I always considered it insecure and a bit strange.
What about tracking? Most UA-camrs don't even mention this topic. The footprints are the most important thing. What about self-deletion as soon as a USB device is removed from Hak5. E.g. a hidden device (long-term) on the projector. Is there a standard setting for this?
Hi. I have tried many times to buy some products from website and all the time my orders was canceled. so, please help to buy your products... I have written many times messages to your support team but I have got only automatic messages which says I have different address and so on problems... so, please let me know how to get touch you in person by phone or something like that... I am planning to buy 26 pcs of different products but no success... wait for reply.
Good morning, I was browsing through UA-cam and I came across this video. After being hacked three different times, And I'm pretty sure it happened while or through Facebook. And it always on the 3rd of the month because that's the day that I received my Social Security Disability payment, wiping me out. Is there anything that I can do to prevent this?
I have to second this. 100% agree with putting food on the table but I miss when you were teaching 10 year old me how to hack and crack for free at home in safe and legal ways
You can't have as much fun as you used to since a lot of the companies have caught on and things like rogue Ap are detected now by apple. Haven't t2sted it recently but I got a notice last time I checked it said Rogue AP warning
In 1986, Congress passed the Computer Fraud and Abuse Act (CFAA), now codified under Title 18 U.S. Code § 1030. This law makes it a federal crime to gain unauthorized access to “protected” computers (otherwise known as “hacking”) with the intent to defraud or do damage.
Friends a hacker and I suspect he ease drops on my text, phone calls and websites. What tools is he using? Never connected to his network or wifi while living with him
Cool stuff to get started and learn but I don't want to be a script kiddie for the rest of my career. I want to make my own stuff and do my own code. Obviously the cables are a different story but everything else can be made or done on my own. The question is, where do I start?
You can make pretty much all of these yourself and you’ll learn A TON doing it. I’m building a pineapple out of my dads old router that I found in the basement.
In 1986, Congress passed the Computer Fraud and Abuse Act (CFAA), now codified under Title 18 U.S. Code § 1030. This law makes it a federal crime to gain unauthorized access to “protected” computers (otherwise known as “hacking”) with the intent to defraud or do damage.
Keep in mind these are all commercial products, You can make your own free (or close to it if you buy the raw hardware) versions just as easily, no reason to go out and buy a pineapple if all you're trying to do is learn. Surprised so much of his kit is out of the box and not as custom, most people I know find the commercial products while great, usually have certain limitations.
In 1986, Congress passed the Computer Fraud and Abuse Act (CFAA), now codified under Title 18 U.S. Code § 1030.
This law makes it a federal crime to gain unauthorized access to “protected” computers (otherwise known as “hacking”) with the intent to defraud or do damage.
No everyone lives in the USA @@robhill8894
@@robhill8894and?
@robhill8894 it's a good thing criminals care about laws, tho😊
@@robhill8894there are many things that are illegal that are still done. Most of the crime is committed by your very own government. So why not be a step or two ahead of them?
From watching you guys live stream in 2005 at the old house with Matt, to what it is now is amazing
"involuntary backup" is underrated af 😂
Very handy in case of a randomware attack ;)
@@0xKremwoosh
You guys got me interested, again, in computer science and offensive security.
Thanks for all you do!
what do you do?
I’d look into emissions security if u can’t detect covert comms using emissions then u mind as well not even try
I've been following you guys off and on for many years. You have helped me and my company a lot, although I'm not near where I need to be in the smarts, I learn something new every time I watch your videos. Thank you so much.
It's crazy how fast time goes by.
Seems like just yesterday I was watching hak5 on tech TV.
@@atheistmecca971 That's right I totally forgot about that!
I've been watching since 2005
Darren and Wes raised my curiosity with Gentoo and compiling my own kernel
From there I was off to the races with a beer in hand
I am still going but without the beer Cheers brother
Thank you so much for taking the time out to put up this kind of information. This was definitely needed. I have projects coming up so this is a plus to be marketable.
Kind of crazy how an employee can accidentally find a USB stick and innocently connect it to their work computer to check what it is. When I used to work at a bank that is why USB sticks are banned and all the computer USB ports does not work and is disabled. Now I have to lock down everything at home so the kids don't get their computers infected or hacked.
So crazy to me. I remember watching the first Hak5 episode and following y'all religiously for years. Damn, we're old asf.
I remember a particular wifi at a Starbucks. Good times.
You can make ALL of these tools yourself and you’ll gain A TON of knowledge doing it.
Who shared this video, you are such a great man You are the best of the best .
You saved my life from hacker .
Thank you so much. 🙏🏼😊
Sometimes these kind of videos teach you more then an hour long lecture video.
Awesome update love everything, still have my 1st rubber ducky, I need to add a few new items to the Christmas list, Cheers mate 👍
Bro sells problem and solution together, Malicious Cable and Detector 🤣🤣🤣
Yee I like that
The way they're simplifying the research process excites me. reminds me of the collaborative AI agents being used by SmythOS to revolutionize corporate operations.
Is ther a more detailed video of the products shown here?
If a want to stole info with a pendrive what do you suggest to buy? Thankz
Our very own Q from James Bond
As a lifelong 007 fan, I am quite honored to receive this comment. Thank you :)
Hi Darren, this may sound strange but, any chance you can do a quick video on the correct way to Shutdown the Pineapple Mark VII please. Installed mine tonight and could not find anything in the online documentation on the shutdown process. I was running it off an external battery so I just Logged Out and pulled out the battery.
Thanks
I love this channel! 😈
I want to buy a full Hak5 gear, how can I get it, I am in Cameroon
kinda random question, can I do with this payload usb a/c sticks, just put a script on so it installs all necessary software and does wind. updates etc?
Maliciuos cables is something i never thought i hear
Is purchasing restricted to universities and government agencies only?
No it is not. You can buy everything yourself.
Darren is a mad dog; Love your business brother!
does those tools also works on phones?
do you deliver to nigeria?
could you guys make an more in depth video of the pineapple? i'd sometimes think to myself I should get one? but then i'm thinking well hat can it do more the a flipper zero with the wifi devboard? would be nice to hear it from the experts themself
for a real world pentest, how useful is the pineapple anymore now that HTTPS is ubiquitous for pretty much any and all website traffic that 'matters'? what data is really gathered with the device that would be damaging, disruptive, or cause an audit failure for either businesses or resident/individuals?
Snooping on HTTP is only one of the myriad of attack vectors. Personally, I find captive portals to be highly effective at collecting credentials and other PII - especially with realistic looking phishing pages. Many operating systems don't even show the URL of the portal, so it only has to "look the part". Then there's DNS spoofing as part of a greater phishing campaign, DoS attacks, WPA handshake captures for password cracking -- especially when coupled with deauthentication attacks, denial of certain protocols (what do most folks do when the VPN "just won't connect"). Both pineapples can be used for enterprise-WPA evil twin attacks. The Enterprise makes a great platform for lateral movement within a network when coupled with C2. Of course testing access points/base stations for vulnerabilities & misconfigurations (e.g. WPS) is a must, and one place it shines where other tools fail to check is testing clients/stations for misconfigurations (e.g. PNL leakage / susceptibility to rogue access points in general). TLS and HSTS are great - but I wouldn't just blindly trust this best-effort protocol.
I wish i could tell you, but im making profit now 😂
Are any skills needed to use omg cable? Is there a userfriendly software?
Do u ship theese products in India it's demanding in india
How can I get in touch with you
When will the Coconut be back in stock?
This is what we needed 🎉Thank you ❤❤❤
In 1986, Congress passed the Computer Fraud and Abuse Act (CFAA), now codified under Title 18 U.S. Code § 1030.
This law makes it a federal crime to gain unauthorized access to “protected” computers (otherwise known as “hacking”) with the intent to defraud or do damage.
What devices should I look into to get .. I've been cyber stalked and electronicly and Harassed for two years by police informants in Chicago...
How can I protect myself and my Fiance and family
Fuck bro, you have been doing this for a long time. I remember listening to your podcast years and years ago. Respect.
Take our money 💰 we’ve come a lonnnnnnnng way from BackTrack
The most complicated thing, how safe is to buy those tools?
hi, and hmm suppose I want to monitor a cell phone. I know the # and the base location- where he lives. What is available to do that?
Bro your joking💀
or only on pc`s?
What's the difference between wifi pineapple mark 7 and wifi pineapple enterprise? And what's the solution for that a homemade router with a "homemade" program?
As a student are these devices okay to test on my home systems?
Why wouldn't they be? Your property is your property. No one can tell you what to do or not to do with your property.
@@ethanrandall3005 Sorry, I should’ve said safe not okay.
Literally the reason we use Crowdstrike, and have all Bluetooth and USB devices blocked according to the type of device that’s being used, it’s literally the best defensive security software suite that exists
Yeah, there are other attacks like Thunderspy which won't be blocked by such software. Physical access is all it needs.
If you think Crowdstrike will protect you, you're a sucker.
So what happens when a USB device lies about what it is? - not sure what it is currently. But 15 years ago, almost every business used the same dell keyboard. I always considered it insecure and a bit strange.
@@pragmaticperson7127Their repetitive misuse of literally says it all.
@@goat-eyeslol. fax.(kidding)
What about tracking? Most UA-camrs don't even mention this topic. The footprints are the most important thing.
What about self-deletion as soon as a USB device is removed from Hak5. E.g. a hidden device (long-term) on the projector. Is there a standard setting for this?
Hi. I have tried many times to buy some products from website and all the time my orders was canceled. so, please help to buy your products... I have written many times messages to your support team but I have got only automatic messages which says I have different address and so on problems... so, please let me know how to get touch you in person by phone or something like that... I am planning to buy 26 pcs of different products but no success... wait for reply.
Can u help me find the signal
Good morning, I was browsing through UA-cam and I came across this video. After being hacked three different times, And I'm pretty sure it happened while or through Facebook. And it always on the 3rd of the month because that's the day that I received my Social Security Disability payment, wiping me out. Is there anything that I can do to prevent this?
Good morning,
Most likely it's a relativ robbing you...
Change all your password a activate 2FA on Facebook
Great gear but I really miss when you used to do regular hacking videos.
I have to second this. 100% agree with putting food on the table but I miss when you were teaching 10 year old me how to hack and crack for free at home in safe and legal ways
Soon... 😉
Why can't people purchase the Kismet Case Mod any longer?
I love how these simple looking devices are so we'll described in how they can be weaponized by anyone tech savvy to intrude networks or systems.
4:20 Love the Hackers movie reference
Just in time for Christmas
You can't have as much fun as you used to since a lot of the companies have caught on and things like rogue Ap are detected now by apple. Haven't t2sted it recently but I got a notice last time I checked it said Rogue AP warning
It's Darren! We missed you!
Want to do a new tutorial "playlist" with wifi pineapple nano/mk7
nice change of pace ! :D
involuntary backup!! hahahaha. thats great dude!
I need to do some shopping 😅 thanks for sharing
Great video
do you plan any good discounts on all those?
In 1986, Congress passed the Computer Fraud and Abuse Act (CFAA), now codified under Title 18 U.S. Code § 1030.
This law makes it a federal crime to gain unauthorized access to “protected” computers (otherwise known as “hacking”) with the intent to defraud or do damage.
Friends a hacker and I suspect he ease drops on my text, phone calls and websites. What tools is he using? Never connected to his network or wifi while living with him
Hak5 4Life
Thank you. Fantastic stuff.
will be more better if u list all the hack5 products and where to buy them
Darren still hacking? Good stuff
Till the 🐄🐄🐄come home
Keep up the good work 💪
Wow 😎 nice tools
can the packet squirrel exploit a printer?
Cool stuff to get started and learn but I don't want to be a script kiddie for the rest of my career. I want to make my own stuff and do my own code. Obviously the cables are a different story but everything else can be made or done on my own. The question is, where do I start?
i just ordered a usb rubber ducky cant wait to prank someone with it
You can make pretty much all of these yourself and you’ll learn A TON doing it. I’m building a pineapple out of my dads old router that I found in the basement.
Dang Darren you just put up our Christmas wish-list.!
hw can i learn hacking
Love it!
I want all of theseeee 😫😫
just like me, getting greed y in buying all
Awesome gear
5:45 did anyone else notice?
Haha yes
Great stuff!
Damn those cables are scary. Imagine replacing a few dozen cables in loose packaging in a walmart or gas station.
Yeah, I'm never buying cheap charging cables again
How much for all of these? Single price for the complete set?
In 1986, Congress passed the Computer Fraud and Abuse Act (CFAA), now codified under Title 18 U.S. Code § 1030.
This law makes it a federal crime to gain unauthorized access to “protected” computers (otherwise known as “hacking”) with the intent to defraud or do damage.
@@robhill8894and?
Electricity can cook a man's dinner but it can also cook the man
We miss Snubs, get her back Darryl
Hilarious delivery
not available in India
Flip the switch , plug it in, when the light turns green.. its a hacked machine
Yooo😂
Wild stuff
Congratulation 🥳
Can i get them all as a gift for my birthday?
I wanted to buy these hacking devices but unfortunately I live in Brazil which is the worst place in the world, it will cost me a lot.
My mouth is drooling. lol@involuntary backup.
this to me is like what sports cars are to others...
Bro, where is hackrfOne?
HackRF One is the best device, so where is it?
I need a malicious cable detector that also a rubber ducky
1:31 come on dude...
That's One Easy Way To Become a Script Kiddie
@Hak5 I need this stickers 😍
Wow. It redefines my view on cybersecurity.
Im on a mission to own all Hak5 products
Nice 🤝
Shucks was really hoping for a discount code on the OMG USB C Elite bidirectional.