Subscribe to our newsletter and always be the first to hear about what is happening.

Workshop: Vienna Austria

November 8-9, 2016

Hands on Hacking with the WiFi Pineapple, USB Rubber Ducky and LAN Turtle with Darren Kitchen, Sebastian Kinne and Robin Wood

From wireless fundamentals to physical access security, man-in-the-middle attacks and precision WiFi exploitation, this workshop builds the competence to effectively exploit a range of Hak5 developed penetration testing tools.

Learn directly from the developers of the WiFi Pineapple, USB Rubber Ducky and LAN Turtle to get the most from these leading penetration testing platforms. Lectures and hands-on exercises emphasize responsible best practices and integration with popular penetration testing workflows.



Your Weekly Dose of Technolust


TekThing… we make technology behave.


What’s new in security, privacy, and internet freedom!


Metasploit Minute – the break down on breaking in.


Essentials for new hackers, enthusiasts, and IT pros…


Learn the ins and outs of the WiFi Pineapple




Darren Kitchen is the founder of Hak5, the award winning Internet television show inspiring hackers and enthusiasts since 2005. Breaking out of the 90s phone phreak scene, he has continued contributing to the hacker community as a speaker, instructor, author and developer of leading penetration testing tools.

Shannon Morse is Hak5’s host, producer, and editor. Her focus is on security, technology, and DIY for hackers and consumers alike. Shannon is an advocate for women in tech and she welcomes beginners with her easy to understand tutorials.


Patrick Norton loves answering tech questions and reviews products from laptops to home theater gear. He co-hosts TekThing with Shannon Morse, AVexcel with Robert Heron, and This Week in Computer Hardware with Ryan Shrout… when he’s not teaching his children how to operate jackhammers or exploring the Great Basin.

Rob “Mubix” Fuller is a Senior Red Teamer. His professional experience starts from his time on active duty as a United States Marine. He has worked with devices and software that run gambit in the security realm. He has a few certifications, but the titles that he holds above the rest are father, husband and United States Marine.

Sebastian Kinne has led software development at Hak5 since 2011. His background in embedded systems and reverse engineering has been instrumental in the success of the WiFi Pineapple, the popular WiFi auditing tool. As an instructor and speaker on WiFi security, chances are he’s sniffed your packets in a demo or two.

01000101 01110110 01101001 01101100 00100000 01010011 01100101 01110010 01110110 01100101 01110010 00100000 01101001 01110011 00100000 01100001 00100000 01110011 01100101 01101110 01110100 01101001 01100101 01101110 01110100 00100000 01100010 01101111 01110100



The WiFi Pineapple is the gold standard rogue access point. Capable of mimicking any hotspot, this honeypot is highly effective at collecting vulnerable clients. Managed in person or remotely through a simple web interface, the operator is uniquely poised as a man-in-the-middle enabling intelligence gathering, host redirection, credential capturing and so much more.

Learn More Shop WiFi Pineapple

The USB Rubber Ducky is the original Keystroke Injection Attack tool. Posing as a generic USB Drive it’s a social engineers best friend. The open source tool is easily programmed allowing it to deliver automated keystrokes capable of gathering intelligence, installing backdoors, exfiltrating data and more – all while bypassing most prevention measures.

Learn More Shop USB Rubber Ducky

The LAN Turtle is a covert Systems Administration and Penetration Testing tool providing stealth remote access, network intelligence gathering, and man-in-the-middle monitoring capabilities. Housed within a generic “USB Ethernet Adapter” case, the LAN Turtle’s covert appearance allows it to blend into many IT environments. Get a shell over SSH, OpenVPN, Meterpreter and more.

Learn More Shop LAN Turtle