The biggest, baddest, worst hacks of 2016. Coming up now on Threat Wire. ——————————- Shop: http://www.hakshop.com Support: http://www.patreon.com/threatwire Subscribe: http://www.youtube.com/hak5 Our Site: http://www.hak5.org Contact Us: http://www.twitter.com/hak5 —————————— Links: https://nakedsecurity.sophos.com/2016/06/27/irs-hacked-again-say-goodbye-to-that-pin-system/ https://www.engadget.com/2016/08/19/new-snowden-docs-suggest-shadow-broker-leak-was-real/ https://www.wired.com/2016/10/nsa-contractor-arrested-taking-top-secret-documents/ http://arstechnica.com/security/2016/12/the-public-evidence-behind-claims-russia-hacked-for-trump/ http://arstechnica.com/security/2016/11/adultfriendfinder-hacked-exposes-400-million-hookup-users/ https://krebsonsecurity.com/2016/09/krebsonsecurity-hit-with-record-ddos/ https://www.dynstatus.com/incidents/5r9mppc1kb77 http://www.nytimes.com/2016/05/13/business/dealbook/swift-global-bank-network-attack.html https://techcrunch.com/2016/12/14/yahoo-discloses-hack-of-1-billion-accounts/ https://haveibeenpwned.com/

Read more

Happy holidays from the team of Hak5! We are celebrating by decorating our con badge Christmas Tree, and sharing our favorite bloopers from 2016. We hope you enjoy this silly episode of Hak5, and we’ll see ya next week with another tech segment! ——————————- Shop: http://www.hakshop.com Support: http://www.patreon.com/threatwire Subscribe: http://www.youtube.com/hak5 Our Site: http://www.hak5.org Contact Us: […]

Read more

Does your favorite news site get an A+ or an F for privacy? Encryption for cameras? Make it so! Yahoo’s breach accounts hit the billions, and a new malvertising campaign hits sites. Coming up now on Threat Wire. Coming up now on Threat Wire. ——————————- Shop: http://www.hakshop.com Support: http://www.patreon.com/threatwire Subscribe: http://www.youtube.com/hak5 Our Site: http://www.hak5.org Contact […]

Read more

Photogrammetry and building 3D topographic maps with drones! All that and more, this time on Hak5! ——————————- Shop: http://www.hakshop.com Support: http://www.patreon.com/threatwire Subscribe: http://www.youtube.com/hak5 Our Site: http://www.hak5.org Contact Us: http://www.twitter.com/hak5 —————————— Check out http://www.patreon.com/threatwire for our Patreon-only Audio RSS feed of Threat Wire! Our last episode on photogrammetry: https://www.hak5.org/episodes/hak5-1815 http://www.123dapp.com/catch http://www.123dapp.com/catch/Southhampton-Shoal-Lighthouse-Standard/3978121 Open source alternatives: http://ccwu.me/vsfm/ and […]

Read more

President Obama wants to know all about the election season hacks, malvertising exploits millions, the NSA can track in-flight cellphone use, and OpenVPN gets an audit! Coming up now on Threat Wire. ——————————- Shop: http://www.hakshop.com Support: http://www.patreon.com/threatwire Subscribe: http://www.youtube.com/hak5 Our Site: http://www.hak5.org Contact Us: http://www.twitter.com/hak5 —————————— Links: https://www.wired.com/2016/12/russian-election-hacking-investigation/ https://www.wired.com/2016/11/hacked-not-audit-election-rest/ http://www.nytimes.com/2016/12/09/us/obama-russia-election-hack.html?_r=0 https://www.cnet.com/news/donald-trump-cia-russia-hacks-election-rnc-dnc/ https://www.cnet.com/news/president-obama-orders-review-of-hack-2016-presidential-campaign/ http://arstechnica.com/tech-policy/2016/12/obama-asks-intel-community-to-conduct-full-review-of-election-related-hacks/ http://arstechnica.com/security/2016/12/millions-exposed-to-malvertising-that-hid-attack-code-in-banner-pixels/ http://www.welivesecurity.com/2016/12/06/readers-popular-websites-targeted-stealthy-stegano-exploit-kit-hiding-pixels-malicious-ads/ […]

Read more

Exfiltrating documents with the USB Rubber Ducky, part 3! This time on Hak5. ——————————- Shop: http://www.hakshop.com Support: http://www.patreon.com/threatwire Subscribe: http://www.youtube.com/hak5 Our Site: http://www.hak5.org Contact Us: http://www.twitter.com/hak5 —————————— Check out Threat Wire on the Hak5 youtube channel. Your source for security, privacy and internet freedom news. We just released an audio RSS feed for our Patreon […]

Read more

AirDroid is vulnerable to hacks, a Zero Day makes Tor uses not so anonymous, the SF Muni hacker gets hacked, and the avalanche botnet is taken offline. Coming up now on Threat Wire. ——————————- Shop: http://www.hakshop.com Support: http://www.patreon.com/threatwire Subscribe: http://www.youtube.com/hak5 Our Site: http://www.hak5.org Contact Us: http://www.twitter.com/hak5 —————————— Links: http://arstechnica.com/security/2016/12/at-least-10-million-android-users-imperiled-by-popular-airdroid-app/ https://blog.zimperium.com/analysis-of-multiple-vulnerabilities-in-airdroid/ http://arstechnica.com/security/2016/11/tor-releases-urgent-update-for-firefox-0day-thats-under-active-attack/ http://arstechnica.com/security/2016/11/firefox-0day-used-against-tor-users-almost-identical-to-one-fbi-used-in-2013/ https://blog.mozilla.org/security/2016/11/30/fixing-an-svg-animation-vulnerability/ https://blog.torproject.org/blog/tor-browser-607-released https://www.cnet.com/news/hackers-sf-muni-ransomware-attack-muni/ […]

Read more

Today we’re continuing on our series on exfiltrating documents with a USB Rubber Ducky. In the last part we tackled the stager payload which enumerated the drive letter of our USB flash drive and executed the staged payload. Today we’re looking at those stages and how they work. Then finally we’ll be wrapping this up […]

Read more

A reused Apple ID could be bad for your privacy, 3 million android devices are vulnerable to hacks, and you can steal cookies from a locked pc with a super cheap device. Coming up now on ThreatWire. ——————————- Shop: http://www.hakshop.com Support: http://www.patreon.com/threatwire Subscribe: http://www.youtube.com/hak5 Our Site: http://www.hak5.org Contact Us: http://www.twitter.com/hak5 —————————— Links: https://threatpost.com/iphone-call-history-synced-to-icloud-without-user-consent-knowledge/122030/ https://thehackernews.com/2016/11/icloud-backup.html https://blog.elcomsoft.com/2016/11/iphone-user-your-calls-go-to-icloud/ […]

Read more

Exfiltrate documents from a target computer within seconds with this USB Rubber Ducky attack! ——————————- Shop: http://www.hakshop.com Support: http://www.patreon.com/threatwire Subscribe: http://www.youtube.com/hak5 Our Site: http://www.hak5.org Contact Us: http://www.twitter.com/hak5 —————————— Full shownotes will be available at http://www.hak5.org

Read more

Turning a Burner Phone into an OpenWRT or WiFi Pineapple LTE modem, this time on Hak5! ——————————- Shop: http://www.hakshop.com Support: http://www.patreon.com/threatwire Subscribe: http://www.youtube.com/hak5 Our Site: http://www.hak5.org Contact Us: http://www.twitter.com/hak5 —————————— NEW! AppleTV App for your viewing pleasure: https://itunes.apple.com/us/app/hak5-tv/id1076116664?mt=8 Mad Props to Richard Hyde for his hard work on developing this app! Today we’re using a […]

Read more

You can now hack your car legally, a printer can also be a fake cell phone tower, and did the Mirai botnet really take down Liberia? All that coming up now on ThreatWire. ——————————- Shop: http://www.hakshop.com Support: http://www.patreon.com/threatwire Subscribe: http://www.youtube.com/hak5 Our Site: http://www.hak5.org Contact Us: http://www.twitter.com/hak5 —————————— Links: https://www.wired.com/2016/10/hacking-car-pacemaker-toaster-just-became-legal/ https://www.cnet.com/roadshow/news/modders-rejoice-its-legal-to-tweak-your-cars-software-now/ https://www.wired.com/2016/11/evil-office-printer-hijacks-cellphone-connection/ http://arstechnica.com/information-technology/2016/11/this-evil-office-printer-hijacks-your-cellphone-connection/ https://julianoliver.com/output/stealth-cell-tower http://www.securityweek.com/mirai-botnet-takes-down-internet-liberia https://medium.com/@networksecurity/shadows-kill-mirai-ddos-botnet-testing-large-scale-attacks-sending-threatening-messages-about-6a61553d1c7#.iz5za4xl3 […]

Read more

The 3 Second Reverse Shell with a USB Rubber Ducky In this tutorial we’ll be setting up a Reverse Shell payload on the USB Rubber Ducky that’ll execute in just 3 seconds. A reverse shell is a type of shell where the victim computer calls back to an attacker’s computer. The attacking computer typically listens […]

Read more

The Shadow Brokers are back with more NSA data, the FCC passes some new privacy laws, and should hacking back, or counterattacking, be legal?. All that coming up now on ThreatWire. ——————————- Shop: http://www.hakshop.com Support: http://www.patreon.com/threatwire Subscribe: http://www.youtube.com/hak5 Our Site: http://www.hak5.org Contact Us: http://www.twitter.com/hak5 —————————— Links: https://motherboard.vice.com/read/shadow-brokers-nsa-hackers-dump-more-files https://medium.com/@shadowbrokerss/message-5-trick-or-treat-e43f946f93e6#.447qr63g2 http://pastebin.com/RK73grmu https://twitter.com/musalbas/status/793001139310559232 https://www.washingtonpost.com/world/national-security/government-alleges-massive-theft-by-nsa-contractor/2016/10/20/e021c380-96cc-11e6-bb29-bf2701dbe0a3_story.html https://krebsonsecurity.com/2016/10/senator-prods-federal-agencies-on-iot-mess/ http://www.warner.senate.gov/public/index.cfm/pressreleases?ContentRecord_id=CD1BBB25-83E0-494D-B7E1-1C350A7CFCCA https://threatpost.com/mirai-vulnerability-disclosed-but-exploits-may-constitute-hacking-back/121644/ https://www.invincealabs.com/blog/2016/10/killing-mirai/ […]

Read more

In this episode of Hak5 we’re joined by Samy Kamkar, the maker of many portable hacker devices like the MagSpoof and KeySweeper just to name a couple. Read about his developments at https://samy.pl/ ——————————- Shop: http://www.hakshop.com Support: http://www.patreon.com/threatwire Subscribe: http://www.youtube.com/hak5 Our Site: http://www.hak5.org Contact Us: http://www.twitter.com/hak5 ——————————

Read more

The internet goes down, more IoT things are being hacked, and a product recall. All that coming up now on ThreatWire! ——————————- Shop: http://www.hakshop.com Support: http://www.patreon.com/threatwire Subscribe: http://www.youtube.com/hak5 Our Site: http://www.hak5.org Contact Us: http://www.twitter.com/hak5 —————————— Links: http://www.businessinsider.com/amazon-spotify-twitter-github-and-etsy-down-in-apparent-dns-attack-2016-10 https://krebsonsecurity.com/2016/10/ddos-on-dyn-impacts-twitter-spotify-reddit/ https://www.dynstatus.com/incidents/nlr4yrr162t8 https://thehackernews.com/2016/10/iot-dyn-ddos-attack.html https://intel.malwaretech.com/botnet/mirai/?h=24 https://krebsonsecurity.com/2016/10/hacked-cameras-dvrs-powered-todays-massive-internet-outage/ https://krebsonsecurity.com/2016/10/iot-device-maker-vows-product-recall-legal-action-against-western-accusers/ https://mp.weixin.qq.com/s?__biz=MzA4MDQ4NjMwOA==&mid=2651450911&idx=1&sn=f4d41b6fae77ece8493fdec1197d97f0&chksm=845ec4d4b3294dc23df1d6ecba1e76ccec9ac6533aef4403ecf34f9b72e4cb3c7c94e57dfc89&mpshare=1&scene=1&srcid=1024DskPGO5o4Jgp1qYNtrDZ#wechat_redirect Youtube Thumbnail credit: https://upload.wikimedia.org/wikipedia/en/a/ad/Webcam.JPG

Read more

Decrypting Morse code with a simple terminal command and a PC sound card, this time on Hak5! Shannon’s call sign is KM6FPP! Listen for her on the radio soon. Installing and setting up XDEMorse: sudo apt-get install xdemorse cd /usr/share/doc/xdemorse/examples/ sudo gunzip xdemorserc.example.gz cp xdemorserc.example ~/.xdemorserc nano ~/.xdemorserc xdemorse & xdemorse http://www.qsl.net/5b4az/pkg/morse/xdemorse/xdemorse.html rscw http://wwwhome.ewi.utwente.nl/~ptdeboer/ham/rscw/ minimodem […]

Read more

On this episode of Hak5 we chat with Nick Cano about hacking video games for fun! Plus, Gene Bransfield joins us to chat War Collar Industries and their new Dope Scope, a directional WiFi Sniffing device that fits in the palm of your hand. https://twitter.com/nickcano93 https://www.nostarch.com/gamehacking https://www.youtube.com/watch?v=I_ExILIAw0Y http://warcollar.com/ https://forums.warcollar.com/ https://www.derbycon.com/ ——————————- Shop: http://www.hakshop.com Support: http://www.patreon.com/threatwire […]

Read more

The makers of Signal get a subpoena, Yahoo experiences more bad press, an NSA contractor is in hot water, and the EU wants to make IoT devices more secure. All that coming up now on Threat Wire. Links: https://whispersystems.org/bigbrother/eastern-virginia-grand-jury/ https://www.aclu.org/blog/free-future/new-documents-reveal-government-effort-impose-secrecy-encryption-company https://theintercept.com/2016/10/10/subpoena-to-encrypted-app-provider-highlights-overbroad-fbi-requests-for-information/ http://www.reuters.com/article/us-yahoo-nsa-exclusive-idUSKCN1241YT https://motherboard.vice.com/read/yahoo-government-email-scanner-was-actually-a-secret-hacking-tool https://theintercept.com/2016/10/07/ex-yahoo-employee-government-spy-program-could-have-given-a-hacker-access-to-all-email/ http://arstechnica.com/tech-policy/2016/10/report-fbi-andor-nsa-ordered-yahoo-to-build-secret-e-mail-search-tool/ https://theintercept.com/2016/10/05/nsa-theft-suspect-works-for-contractor-that-sells-the-government-tech-for-spotting-rogue-employees/ https://www.cnet.com/news/harold-thomas-martin-iii-booz-allen-hamilton-edward-snowden-leak/ https://www.wired.com/2016/10/nsa-contractor-arrested-taking-top-secret-documents/ https://krebsonsecurity.com/2016/10/europe-to-push-new-security-rules-amid-iot-mess/ https://www.euractiv.com/section/innovation-industry/news/commission-plans-cybersecurity-rules-for-internet-connected-machines/ Youtube Thumbnail credit: https://cdn0.vox-cdn.com/thumbor/6HssVl1ip74KsAGiWiizB9l234g=/0x53:1020×627/1600×900/cdn0.vox-cdn.com/uploads/chorus_image/image/51187061/signal-003.0.jpg ——————————- […]

Read more

Hak5 heads to DerbyCon in Louisville, KY to chat with Tim MalcomVetter about breaking tokenization in the credit card industry. Plus, RenderMan joins us to discuss the security and privacy flaws in internet of things connected adult toys. ——————————- Shop: http://www.hakshop.com Support: http://www.patreon.com/threatwire Subscribe: http://www.youtube.com/hak5 Our Site: http://www.hak5.org Contact Us: http://www.twitter.com/hak5 —————————— https://twitter.com/malcomvetter https://www.youtube.com/watch?v=17UcQohAjXw https://www.derbycon.com/ […]

Read more

Emergency text alerts get a well needed upgrade, but with that I also have some concerns. DDoS gets more costly and more widespread, and Yahoo! faces more problems. All that coming up now on Threat Wire. ——————————- Shop: http://www.hakshop.com Support: http://www.patreon.com/threatwire Subscribe: http://www.youtube.com/hak5 Our Site: http://www.hak5.org Contact Us: http://www.twitter.com/hak5 —————————— https://www.wired.com/2016/09/emergency-alert-texts-getting-much-needed-upgrade/ https://www.cnet.com/news/new-phone-amber-alerts-could-include-photo-of-missing-child/ http://arstechnica.com/security/2016/09/botnet-of-145k-cameras-reportedly-deliver-internets-biggest-ddos-ever/ http://arstechnica.com/security/2016/10/brace-yourselves-source-code-powering-potent-iot-ddoses-just-went-public/ https://krebsonsecurity.com/2016/10/source-code-for-iot-botnet-mirai-released/ […]

Read more

Hak5 heads to Louisville, KY for DerbyCon 6.0, to chat with the Dave Kennedy, founder of DerbyCon. Plus the winners of the Hack My Derby Contest, AgentSixty6 and Gangrif chat about their mods! ——————————- Shop: http://www.hakshop.com Support: http://www.patreon.com/threatwire Subscribe: http://www.youtube.com/hak5 Our Site: http://www.hak5.org Contact Us: http://www.twitter.com/hak5 —————————— https://twitter.com/HackingDave https://www.trustedsec.com/ https://github.com/trustedsec https://www.derbycon.com/ https://twitter.com/agentsixty6 https://twitter.com/gangrif http://hackmyderby.com/about https://www.undrground.org/hmd2015

Read more

An InfoSec Journalist is Censored by a DDoS, the Yahoo Hack Leaks Half a Billion Creds, and Researchers remotely hack a tesla’s brake system. All that coming up now on Threat Wire. All that coming up now on ThreatWire. ——————————- Shop: http://www.hakshop.com Support: http://www.patreon.com/threatwire Subscribe: http://www.youtube.com/hak5 Our Site: http://www.hak5.org Contact Us: http://www.twitter.com/hak5 —————————— Links: https://threatpost.com/questions-mount-around-yahoo-breach/120876/ […]

Read more

Stealing creds from a locked PC using a Hak5 LAN Turtle, plus Mubix joins us! This time on Hak5! ——————————- Shop: http://www.hakshop.com Support: http://www.patreon.com/threatwire Subscribe: http://www.youtube.com/hak5 Our Site: http://www.hak5.org Contact Us: http://www.twitter.com/hak5 —————————— Stealing creds from a locked PC using a Hak5 LAN Turtle, plus Mubix joins us! This time on Hak5! https://room362.com/ – Mubix’s […]

Read more

Today we review MOSH an alternative to SSH that’s better at high latency and intermittent Internet connections. Plus, your USB Rubber Ducky questions and tips! ——————————- Shop: http://www.hakshop.com Support: http://www.patreon.com/threatwire Subscribe: http://www.youtube.com/hak5 Our Site: http://www.hak5.org Contact Us: http://www.twitter.com/hak5 —————————— https://mosh.org/ ConsoleHost_history.txt is kept under %APPDATA%\Microsoft\Windows\PowerShell\PSReadline\ConsoleHost_history.txt, you can check where your system keeps this file by […]

Read more

Steal passwords from a locked PC, 911 is still vulnerable to hacks, and Chrome calls out non secure sites. All that coming up now on ThreatWire. ——————————- Shop: http://www.hakshop.com Support: http://www.patreon.com/threatwire Subscribe: http://www.youtube.com/hak5 Our Site: http://www.hak5.org Contact Us: http://www.twitter.com/hak5 —————————— Links: Learn more about NTLM Challenge Response Authentication: https://msdn.microsoft.com/en-us/library/windows/desktop/aa378749(v=vs.85).aspx http://arstechnica.com/security/2016/09/stealing-login-credentials-from-a-locked-pc-or-mac-just-got-easier/ https://github.com/Spiderlabs/Responder http://www.exploit-monday.com/2016/09/introduction-to-windows-device-guard.html https://room362.com/post/2016/snagging-creds-from-locked-machines/ http://www.cnet.com/news/chrome-warning-insecure-http-websites-expose-passwords-credit-card-numbers/ https://blog.chromium.org/2016/09/moving-towards-more-secure-web.html […]

Read more

Previously on Hak5, we showed off an USB Rubber Ducky payload to steal plaintext Windows passwords in 15 seconds. So, what if we told you we could get just the logon hash in under two? A 2 second technique for stealing Windows password hashes and otherwise auditing corporate USB drive policies! Learn more on today’s […]

Read more