The Best Wikipedia Reader EVER, this time on Hak5! Links: https://play.google.com/store/apps/details?id=com.arcdatum.apps.readable ——————————- Shop: http://www.hakshop.com Support: http://www.patreon.com/threatwire Subscribe: http://www.youtube.com/hak5 Our Site: http://www.hak5.org Contact Us: http://www.twitter.com/hak5 Threat Wire RSS: https://shannonmorse.podbean.com/feed/ Threat Wire iTunes: https://itunes.apple.com/us/podcast/threat-wire/id1197048999 ——————————

Read more

Darren chats with EvilMog (Team Hashcat) about Hashcat, the world’s fastest and most advanced password recovery tool. Find out more about Hashcat at https://hashcat.net/hashcat/ “Special thanks to atom, epixoip, purehate, minga, thank you for all that you do.” – EvilMog ——————————- Shop: http://www.hakshop.com Support: http://www.patreon.com/threatwire Subscribe: http://www.youtube.com/hak5 Our Site: http://www.hak5.org Contact Us: http://www.twitter.com/hak5 Threat Wire […]

Read more

Woody joins us on Hak5 to chat about his journey in discovering proximity sensor fingerprinting of smartphones and developing the IRis board for infrared hacks. ——————————- Shop: http://www.hakshop.com Support: http://www.patreon.com/threatwire Subscribe: http://www.youtube.com/hak5 Our Site: http://www.hak5.org Contact Us: http://www.twitter.com/hak5 Threat Wire RSS: https://shannonmorse.podbean.com/feed/ Threat Wire iTunes: https://itunes.apple.com/us/podcast/threat-wire/id1197048999 —————————— Woody on Twitter: https://twitter.com/tb69rr Github for IRis: The […]

Read more

Today on Hak5 we head to Washington DC for Shmoocon 2017! We chat sniffing IR signals, how to get into SDR, Dog Collar Radio Roulette, and advertising malware detection! ——————————- Shop: http://www.hakshop.com Support: http://www.patreon.com/threatwire Subscribe: http://www.youtube.com/hak5 Our Site: http://www.hak5.org Contact Us: http://www.twitter.com/hak5 —————————— See the talks! http://shmoocon.org/ Russell Handorf – @dntlookbehindu – http://wctf.ninja Hak5 eps […]

Read more

Sandboxes, packet sniffing and malware analysis – this time on Hak5! ——————————- Shop: http://www.hakshop.com Support: http://www.patreon.com/threatwire Subscribe: http://www.youtube.com/hak5 Our Site: http://www.hak5.org Contact Us: http://www.twitter.com/hak5 —————————— ifconfig -a tcpdump -i vmnet8 vmnet-sniffer -e -w test.pcap /dev/vmnet8 wireshark test.pcap & sudo dpkg-reconfigure wireshark-common sudo usermod -a -G wireshark $USER !(icmp or dns or arp or icmpv6 or […]

Read more

How do we hack our way to better habits and goals? This time on Hak5! ——————————- Shop: http://www.hakshop.com Support: http://www.patreon.com/threatwire Subscribe: http://www.youtube.com/hak5 Our Site: http://www.hak5.org Contact Us: http://www.twitter.com/hak5 —————————— Shannon will be in Las Vegas next week for CES! Join her at the TekThing meetup on Friday night. Event details are at http://www.facebook.com/tekthing Loop Habit […]

Read more

Privilege escalation on Windows, Meterpreter Reverse Shells and Staged Payloads with the USB Rubber Ducky. All that and more, this time on Hak5. ——————————- Shop: http://www.hakshop.com Support: http://www.patreon.com/threatwire Subscribe: http://www.youtube.com/hak5 Our Site: http://www.hak5.org Contact Us: http://www.twitter.com/hak5 —————————— Check out http://www.patreon.com/threatwire for our Patreon-only Audio RSS feed of Threat Wire! git clone https://github.com/SkiddieTech/UAC-D-E-Rubber-Ducky cd UAC-D-E-Rubber-Ducky python […]

Read more

Happy holidays from the team of Hak5! We are celebrating by decorating our con badge Christmas Tree, and sharing our favorite bloopers from 2016. We hope you enjoy this silly episode of Hak5, and we’ll see ya next week with another tech segment! ——————————- Shop: http://www.hakshop.com Support: http://www.patreon.com/threatwire Subscribe: http://www.youtube.com/hak5 Our Site: http://www.hak5.org Contact Us: […]

Read more

Photogrammetry and building 3D topographic maps with drones! All that and more, this time on Hak5! ——————————- Shop: http://www.hakshop.com Support: http://www.patreon.com/threatwire Subscribe: http://www.youtube.com/hak5 Our Site: http://www.hak5.org Contact Us: http://www.twitter.com/hak5 —————————— Check out http://www.patreon.com/threatwire for our Patreon-only Audio RSS feed of Threat Wire! Our last episode on photogrammetry: https://www.hak5.org/episodes/hak5-1815 http://www.123dapp.com/catch http://www.123dapp.com/catch/Southhampton-Shoal-Lighthouse-Standard/3978121 Open source alternatives: http://ccwu.me/vsfm/ and […]

Read more

Exfiltrating documents with the USB Rubber Ducky, part 3! This time on Hak5. ——————————- Shop: http://www.hakshop.com Support: http://www.patreon.com/threatwire Subscribe: http://www.youtube.com/hak5 Our Site: http://www.hak5.org Contact Us: http://www.twitter.com/hak5 —————————— Check out Threat Wire on the Hak5 youtube channel. Your source for security, privacy and internet freedom news. We just released an audio RSS feed for our Patreon […]

Read more

Today we’re continuing on our series on exfiltrating documents with a USB Rubber Ducky. In the last part we tackled the stager payload which enumerated the drive letter of our USB flash drive and executed the staged payload. Today we’re looking at those stages and how they work. Then finally we’ll be wrapping this up […]

Read more

Exfiltrate documents from a target computer within seconds with this USB Rubber Ducky attack! ——————————- Shop: http://www.hakshop.com Support: http://www.patreon.com/threatwire Subscribe: http://www.youtube.com/hak5 Our Site: http://www.hak5.org Contact Us: http://www.twitter.com/hak5 —————————— Full shownotes will be available at http://www.hak5.org

Read more

Turning a Burner Phone into an OpenWRT or WiFi Pineapple LTE modem, this time on Hak5! ——————————- Shop: http://www.hakshop.com Support: http://www.patreon.com/threatwire Subscribe: http://www.youtube.com/hak5 Our Site: http://www.hak5.org Contact Us: http://www.twitter.com/hak5 —————————— NEW! AppleTV App for your viewing pleasure: https://itunes.apple.com/us/app/hak5-tv/id1076116664?mt=8 Mad Props to Richard Hyde for his hard work on developing this app! Today we’re using a […]

Read more

The 3 Second Reverse Shell with a USB Rubber Ducky In this tutorial we’ll be setting up a Reverse Shell payload on the USB Rubber Ducky that’ll execute in just 3 seconds. A reverse shell is a type of shell where the victim computer calls back to an attacker’s computer. The attacking computer typically listens […]

Read more

In this episode of Hak5 we’re joined by Samy Kamkar, the maker of many portable hacker devices like the MagSpoof and KeySweeper just to name a couple. Read about his developments at https://samy.pl/ ——————————- Shop: http://www.hakshop.com Support: http://www.patreon.com/threatwire Subscribe: http://www.youtube.com/hak5 Our Site: http://www.hak5.org Contact Us: http://www.twitter.com/hak5 ——————————

Read more

Decrypting Morse code with a simple terminal command and a PC sound card, this time on Hak5! Shannon’s call sign is KM6FPP! Listen for her on the radio soon. Installing and setting up XDEMorse: sudo apt-get install xdemorse cd /usr/share/doc/xdemorse/examples/ sudo gunzip xdemorserc.example.gz cp xdemorserc.example ~/.xdemorserc nano ~/.xdemorserc xdemorse & xdemorse http://www.qsl.net/5b4az/pkg/morse/xdemorse/xdemorse.html rscw http://wwwhome.ewi.utwente.nl/~ptdeboer/ham/rscw/ minimodem […]

Read more

On this episode of Hak5 we chat with Nick Cano about hacking video games for fun! Plus, Gene Bransfield joins us to chat War Collar Industries and their new Dope Scope, a directional WiFi Sniffing device that fits in the palm of your hand. https://twitter.com/nickcano93 https://www.nostarch.com/gamehacking https://www.youtube.com/watch?v=I_ExILIAw0Y http://warcollar.com/ https://forums.warcollar.com/ https://www.derbycon.com/ ——————————- Shop: http://www.hakshop.com Support: http://www.patreon.com/threatwire […]

Read more

Hak5 heads to DerbyCon in Louisville, KY to chat with Tim MalcomVetter about breaking tokenization in the credit card industry. Plus, RenderMan joins us to discuss the security and privacy flaws in internet of things connected adult toys. ——————————- Shop: http://www.hakshop.com Support: http://www.patreon.com/threatwire Subscribe: http://www.youtube.com/hak5 Our Site: http://www.hak5.org Contact Us: http://www.twitter.com/hak5 —————————— https://twitter.com/malcomvetter https://www.youtube.com/watch?v=17UcQohAjXw https://www.derbycon.com/ […]

Read more

Hak5 heads to Louisville, KY for DerbyCon 6.0, to chat with the Dave Kennedy, founder of DerbyCon. Plus the winners of the Hack My Derby Contest, AgentSixty6 and Gangrif chat about their mods! ——————————- Shop: http://www.hakshop.com Support: http://www.patreon.com/threatwire Subscribe: http://www.youtube.com/hak5 Our Site: http://www.hak5.org Contact Us: http://www.twitter.com/hak5 —————————— https://twitter.com/HackingDave https://www.trustedsec.com/ https://github.com/trustedsec https://www.derbycon.com/ https://twitter.com/agentsixty6 https://twitter.com/gangrif http://hackmyderby.com/about https://www.undrground.org/hmd2015

Read more

Stealing creds from a locked PC using a Hak5 LAN Turtle, plus Mubix joins us! This time on Hak5! ——————————- Shop: http://www.hakshop.com Support: http://www.patreon.com/threatwire Subscribe: http://www.youtube.com/hak5 Our Site: http://www.hak5.org Contact Us: http://www.twitter.com/hak5 —————————— Stealing creds from a locked PC using a Hak5 LAN Turtle, plus Mubix joins us! This time on Hak5! https://room362.com/ – Mubix’s […]

Read more

Today we review MOSH an alternative to SSH that’s better at high latency and intermittent Internet connections. Plus, your USB Rubber Ducky questions and tips! ——————————- Shop: http://www.hakshop.com Support: http://www.patreon.com/threatwire Subscribe: http://www.youtube.com/hak5 Our Site: http://www.hak5.org Contact Us: http://www.twitter.com/hak5 —————————— https://mosh.org/ ConsoleHost_history.txt is kept under %APPDATA%\Microsoft\Windows\PowerShell\PSReadline\ConsoleHost_history.txt, you can check where your system keeps this file by […]

Read more

Previously on Hak5, we showed off an USB Rubber Ducky payload to steal plaintext Windows passwords in 15 seconds. So, what if we told you we could get just the logon hash in under two? A 2 second technique for stealing Windows password hashes and otherwise auditing corporate USB drive policies! Learn more on today’s […]

Read more

Pilfering Passwords with the USB Rubber Ducky Can you social engineer your target into plugging in a USB drive? How about distracting ’em for the briefest of moments? 15 seconds of physical access and a USB Rubber Ducky is all it takes to swipe passwords from an unattended PC. In honor of the USB Rubber […]

Read more