Renowned information security devices for penetration testers and IT professionals
USB AUTOMATION AND PENETRATION TESTING
The best penetration testers know that with the right tools and a few seconds of physical access, all bets are off. Since 2005 Hak5 has been developing just such tools – combining lethal power, elegance and simplicity.
USB Rubber Ducky
The USB Rubber Ducky is a keystroke injection tool disguised as a generic flash drive. Computers recognize it as a regular keyboard and automatically accept its pre-programmed keystroke payloads at over 1000 words per minute.
By emulating combinations of trusted USB devices — like gigabit Ethernet, serial, flash storage and keyboards — the Bash Bunny tricks computers into divulging data, exfiltrating documents, installing backdoors and many more exploits.
ETHERNET REMOTE ACCESS AND MAN-IN-THE-MIDDLE
Simple and effective. These stealthy Ethernet multi-tools are expandable platforms for remote access and man-in-the-middle. Their discreet nature allows them to easily blend into network environments.
The Packet Squirrel by Hak5 is a stealthy pocket-sized man-in-the-middle.
This Ethernet multi-tool is designed to give you covert remote access, painless packet captures, and secure VPN connections with the flip of a switch.
USB Ethernet adapters with covert backdoors. These seemingly innocent USB Ethernet adapters are discreet remote access toolkits and man-in-the-middles for penetration testers and systems administrators.
WIFI RECONNAISSANCE AND INTERCEPTION
At the core of the WiFi Pineapple is PineAP, an advanced suite of wireless penetration testing tools for reconnaissance, man-in-the-middle, tracking, logging and reporting. Utilizing our unique hardware design, PineAP is the most effective rogue access point suite available.
WiFi Pineapple TETRA
The WiFi Pineapple TETRA is a rock solid dual-band penetration testing base station with exceptional performance.
Its two discreet dual-band (2.4/5 GHz) Atheros radios leverage a PCI Express bus for stability and speed.
WiFi Pineapple NANO
Engineered from the ground up, The WiFi Pineapple NANO was first stripped to its core. Then building on the successes and feedback from its predecessors, we developed a platform centered around performance and usability.
Darren Kitchen is the founder of Hak5, the award winning Internet television show inspiring hackers and enthusiasts since 2005. Breaking out of the 90s phone phreak scene, he has continued contributing to the hacker community as a speaker, instructor, author and developer of leading penetration testing tools.
Patrick Norton loves answering tech questions and reviews products from laptops to home theater gear. He co-hosts TekThing with Shannon Morse, AVexcel with Robert Heron, and This Week in Computer Hardware with Ryan Shrout… when he’s not teaching his children how to operate jackhammers or exploring the Great Basin.
Rob “Mubix” Fuller is a Senior Red Teamer. His professional experience starts from his time on active duty as a United States Marine. He has worked with devices and software that run the gamut in the security realm. He has a few certifications, but the titles that he holds above the rest are father, husband and United States Marine.
Sebastian Kinne has led software development at Hak5 since 2011. His background in embedded systems and reverse engineering has been instrumental in the success of the WiFi Pineapple, the popular WiFi auditing tool. As an instructor and speaker on WiFi security, chances are he’s sniffed your packets in a demo or two.
01000101 01110110 01101001 01101100 00100000 01010011 01100101 01110010 01110110 01100101 01110010 00100000 01101001 01110011 00100000 01100001 00100000 01110011 01100101 01101110 01110100 01101001 01100101 01101110 01110100 00100000 01100010 01101111 01110100