17 Hacker Tools in 7 Minutes - ALL Hak5 Gear
Ғылым және технология
Find all the Hak5 pentest gear, videos, payloads & an awesome community at hak5.org
____________________________________________
Founded in 2005, Hak5's mission is to advance the InfoSec industry. We do this through our award winning educational podcasts, leading pentest gear, and inclusive community - where all hackers belong.
Пікірлер: 205
"involuntary backup" is underrated af 😂
@krem2335
5 ай бұрын
Very handy in case of a randomware attack ;)
@APinTheAK
5 ай бұрын
@@krem2335woosh
You guys got me interested, again, in computer science and offensive security. Thanks for all you do!
@muneeburrehman547
5 ай бұрын
what do you do?
@tonyzone8999
29 күн бұрын
I’d look into emissions security if u can’t detect covert comms using emissions then u mind as well not even try
Keep in mind these are all commercial products, You can make your own free (or close to it if you buy the raw hardware) versions just as easily, no reason to go out and buy a pineapple if all you're trying to do is learn. Surprised so much of his kit is out of the box and not as custom, most people I know find the commercial products while great, usually have certain limitations.
@robhill8894
5 ай бұрын
In 1986, Congress passed the Computer Fraud and Abuse Act (CFAA), now codified under Title 18 U.S. Code § 1030. This law makes it a federal crime to gain unauthorized access to “protected” computers (otherwise known as “hacking”) with the intent to defraud or do damage.
@settlece
5 ай бұрын
No everyone lives in the USA @@robhill8894
@APinTheAK
5 ай бұрын
@@robhill8894and?
@yingandyang10
4 ай бұрын
@robhill8894 it's a good thing criminals care about laws, tho😊
@outdoorfrenzy
4 ай бұрын
@@robhill8894there are many things that are illegal that are still done. Most of the crime is committed by your very own government. So why not be a step or two ahead of them?
From watching you guys live stream in 2005 at the old house with Matt, to what it is now is amazing
Thank you so much for taking the time out to put up this kind of information. This was definitely needed. I have projects coming up so this is a plus to be marketable.
It's crazy how fast time goes by.
@atheistmecca971
5 ай бұрын
Seems like just yesterday I was watching hak5 on tech TV.
@MasikBumbasik
5 ай бұрын
@@atheistmecca971 That's right I totally forgot about that!
I've been watching since 2005 Darren and Wes raised my curiosity with Gentoo and compiling my own kernel From there I was off to the races with a beer in hand I am still going but without the beer Cheers brother
Awesome update love everything, still have my 1st rubber ducky, I need to add a few new items to the Christmas list, Cheers mate 👍
Who shared this video, you are such a great man You are the best of the best . You saved my life from hacker . Thank you so much. 🙏🏼😊
This is what we needed 🎉Thank you ❤❤❤
@robhill8894
5 ай бұрын
In 1986, Congress passed the Computer Fraud and Abuse Act (CFAA), now codified under Title 18 U.S. Code § 1030. This law makes it a federal crime to gain unauthorized access to “protected” computers (otherwise known as “hacking”) with the intent to defraud or do damage.
Darren is a mad dog; Love your business brother!
Fuck bro, you have been doing this for a long time. I remember listening to your podcast years and years ago. Respect.
So crazy to me. I remember watching the first Hak5 episode and following y'all religiously for years. Damn, we're old asf.
@blaise-of-glory
5 ай бұрын
I remember a particular wifi at a Starbucks. Good times.
@robotron1236
4 ай бұрын
You can make ALL of these tools yourself and you’ll gain A TON of knowledge doing it.
I love this channel! 😈
Thank you. Fantastic stuff.
This video is going to be invaluable to all the cyber professionals who didn't save the pamphlets and have no idea what half the stuff is anymore.
@shawnmendrek3544
3 ай бұрын
No way you can keep up 100%, tech and info is changing every day so fast.
Great video
Keep up the good work 💪
nice change of pace ! :D
Love it!
I need to do some shopping 😅 thanks for sharing
Great stuff!
Just in time for Christmas
Sometimes these kind of videos teach you more then an hour long lecture video.
Awesome gear
I love how these simple looking devices are so we'll described in how they can be weaponized by anyone tech savvy to intrude networks or systems.
Wow 😎 nice tools
Dang Darren you just put up our Christmas wish-list.!
Kind of crazy how an employee can accidentally find a USB stick and innocently connect it to their work computer to check what it is. When I used to work at a bank that is why USB sticks are banned and all the computer USB ports does not work and is disabled. Now I have to lock down everything at home so the kids don't get their computers infected or hacked.
Wow good vidéo i hope one day i get to you're level of knowledge🤖
4:20 Love the Hackers movie reference
Maliciuos cables is something i never thought i hear
Hi Darren, this may sound strange but, any chance you can do a quick video on the correct way to Shutdown the Pineapple Mark VII please. Installed mine tonight and could not find anything in the online documentation on the shutdown process. I was running it off an external battery so I just Logged Out and pulled out the battery. Thanks
kinda random question, can I do with this payload usb a/c sticks, just put a script on so it installs all necessary software and does wind. updates etc?
involuntary backup!! hahahaha. thats great dude!
Bro sells problem and solution together, Malicious Cable and Detector 🤣🤣🤣
Our very own Q from James Bond
@DarrenKitchen
5 ай бұрын
As a lifelong 007 fan, I am quite honored to receive this comment. Thank you :)
This is so intriguing...😊😊😊
I want all of theseeee 😫😫
I still have my 1st rubber ducky from your initial launch 😂 love that little guy.
could you guys make an more in depth video of the pineapple? i'd sometimes think to myself I should get one? but then i'm thinking well hat can it do more the a flipper zero with the wifi devboard? would be nice to hear it from the experts themself
@cathal2986
2 ай бұрын
An easy way to think of it is that a Pineapple can pretend to be a real Wi-Fi, tricking devices and launching attacks. A Flipper can only really scout out networks and disrupt them. Although it can create networks, any user that joins won't be able to access the internet as it's just not built for that. Both are great tools in their own respect, but it's like comparing a swiss army knife to a machete.
Are any skills needed to use omg cable? Is there a userfriendly software?
If a want to stole info with a pendrive what do you suggest to buy? Thankz
Hilarious delivery
Wild stuff
Great gear but I really miss when you used to do regular hacking videos.
@oisinhickey5904
5 ай бұрын
I have to second this. 100% agree with putting food on the table but I miss when you were teaching 10 year old me how to hack and crack for free at home in safe and legal ways
@GlytchTech
5 ай бұрын
Soon... 😉
Congratulation 🥳
Hak5 4Life
When will the Coconut be back in stock?
does those tools also works on phones?
Do u ship theese products in India it's demanding in india
Nice
Nice 🤝
Take our money 💰 we’ve come a lonnnnnnnng way from BackTrack
You can't have as much fun as you used to since a lot of the companies have caught on and things like rogue Ap are detected now by apple. Haven't t2sted it recently but I got a notice last time I checked it said Rogue AP warning
I have an old pineapple and a ducky without its shell .. great stuff .. always want a squirrel but never could afford it .. but fun people making fun things is fun
What's the difference between wifi pineapple mark 7 and wifi pineapple enterprise? And what's the solution for that a homemade router with a "homemade" program?
Thanks
It's Darren! We missed you!
You can make pretty much all of these yourself and you’ll learn A TON doing it. I’m building a pineapple out of my dads old router that I found in the basement.
will be more better if u list all the hack5 products and where to buy them
Wow. It redefines my view on cybersecurity.
thanks
The most complicated thing, how safe is to buy those tools?
My mouth is drooling. lol@involuntary backup.
@Hak5 I need this stickers 😍
God damn it i was sure i had tge bright idea for the screen crab had it years agi actually when watching netflix over discord was a thing
Want to do a new tutorial "playlist" with wifi pineapple nano/mk7
Why can't people purchase the Kismet Case Mod any longer?
Good morning, I was browsing through KZread and I came across this video. After being hacked three different times, And I'm pretty sure it happened while or through Facebook. And it always on the 3rd of the month because that's the day that I received my Social Security Disability payment, wiping me out. Is there anything that I can do to prevent this?
@tiloalo
5 ай бұрын
Good morning, Most likely it's a relativ robbing you... Change all your password a activate 2FA on Facebook
I need a malicious cable detector that also a rubber ducky
Literally the reason we use Crowdstrike, and have all Bluetooth and USB devices blocked according to the type of device that’s being used, it’s literally the best defensive security software suite that exists
@wildmusical
5 ай бұрын
Yeah, there are other attacks like Thunderspy which won't be blocked by such software. Physical access is all it needs.
@pragmaticperson7127
5 ай бұрын
If you think Crowdstrike will protect you, you're a sucker.
@josholin31
5 ай бұрын
So what happens when a USB device lies about what it is? - not sure what it is currently. But 15 years ago, almost every business used the same dell keyboard. I always considered it insecure and a bit strange.
@goat-eyes
5 ай бұрын
@@pragmaticperson7127Their repetitive misuse of literally says it all.
@APinTheAK
5 ай бұрын
@@goat-eyeslol. fax.(kidding)
or only on pc`s?
As a student are these devices okay to test on my home systems?
@ethanrandall3005
5 ай бұрын
Why wouldn't they be? Your property is your property. No one can tell you what to do or not to do with your property.
@RobertJohnson-lb3qz
5 ай бұрын
@@ethanrandall3005 Sorry, I should’ve said safe not okay.
What about tracking? Most KZreadrs don't even mention this topic. The footprints are the most important thing. What about self-deletion as soon as a USB device is removed from Hak5. E.g. a hidden device (long-term) on the projector. Is there a standard setting for this?
Damn those cables are scary. Imagine replacing a few dozen cables in loose packaging in a walmart or gas station.
@TheSquidNinja
5 ай бұрын
Yeah, I'm never buying cheap charging cables again
Darren still hacking? Good stuff
@GlytchTech
5 ай бұрын
Till the 🐄🐄🐄come home
How can I get in touch with you
Im on a mission to own all Hak5 products
Must watch and buy come 2024
Love
ended up finding out about these because there was a sticker of the wifi pineapple on my pc i bought on ebay
thats crazy
Hi. I have tried many times to buy some products from website and all the time my orders was canceled. so, please help to buy your products... I have written many times messages to your support team but I have got only automatic messages which says I have different address and so on problems... so, please let me know how to get touch you in person by phone or something like that... I am planning to buy 26 pcs of different products but no success... wait for reply.
hi, and hmm suppose I want to monitor a cell phone. I know the # and the base location- where he lives. What is available to do that?
@ranjanfernando3261
2 ай бұрын
Bro your joking💀
Collecting hak5 gadgets is my dream. But I know its not possible for me 😢
do you plan any good discounts on all those?
@robhill8894
5 ай бұрын
In 1986, Congress passed the Computer Fraud and Abuse Act (CFAA), now codified under Title 18 U.S. Code § 1030. This law makes it a federal crime to gain unauthorized access to “protected” computers (otherwise known as “hacking”) with the intent to defraud or do damage.
We miss Snubs, get her back Darryl
nice
Shucks was really hoping for a discount code on the OMG USB C Elite bidirectional.
Man what's that WORLD!
its expensive as hell brooooo
Involuntary backup; hahaha
And still until today, after 2.years I don't buy everything because it's to expensive.
all these things sell out the second they come out tho
Hit the like button faster than you can say Worcestershire sauce.
Someone tried to use a shark jack years ago on a network I managed. It was useless hahaha.
Can i get them all as a gift for my birthday?
for a real world pentest, how useful is the pineapple anymore now that HTTPS is ubiquitous for pretty much any and all website traffic that 'matters'? what data is really gathered with the device that would be damaging, disruptive, or cause an audit failure for either businesses or resident/individuals?
@DarrenKitchen
5 ай бұрын
Snooping on HTTP is only one of the myriad of attack vectors. Personally, I find captive portals to be highly effective at collecting credentials and other PII - especially with realistic looking phishing pages. Many operating systems don't even show the URL of the portal, so it only has to "look the part". Then there's DNS spoofing as part of a greater phishing campaign, DoS attacks, WPA handshake captures for password cracking -- especially when coupled with deauthentication attacks, denial of certain protocols (what do most folks do when the VPN "just won't connect"). Both pineapples can be used for enterprise-WPA evil twin attacks. The Enterprise makes a great platform for lateral movement within a network when coupled with C2. Of course testing access points/base stations for vulnerabilities & misconfigurations (e.g. WPS) is a must, and one place it shines where other tools fail to check is testing clients/stations for misconfigurations (e.g. PNL leakage / susceptibility to rogue access points in general). TLS and HSTS are great - but I wouldn't just blindly trust this best-effort protocol.
I wanted to buy these hacking devices but unfortunately I live in Brazil which is the worst place in the world, it will cost me a lot.