hak5.org
Open in
urlscan Pro
23.227.38.65
Public Scan
Submitted URL: http://hak5.org/
Effective URL: https://hak5.org/
Submission: On August 24 via api from CA
Effective URL: https://hak5.org/
Submission: On August 24 via api from CA
Form analysis
9 forms found in the DOMPOST /checkout
<form action="/checkout" method="post" data-money-format="${{amount}}" data-shop-currency="USD" data-shop-name="Hak5" class="js-cart_content__form hidden"> <a class="cart_content__continue-shopping secondary_button">
Continue Shopping</a>
<ul class="cart_items js-cart_items clearfix"></ul>
<hr>
<ul>
<li class="cart_subtotal js-cart_subtotal"> <span class="right"> <span class="money">$0.00</span></span> <span>Subtotal</span></li>
<li> <input type="submit" class="action_button" value="Go to cart"></li>
</ul>
</form>
POST /checkout
<form action="/checkout" method="post" data-money-format="${{amount}}" data-shop-currency="USD" data-shop-name="Hak5" class="js-cart_content__form hidden"> <a class="cart_content__continue-shopping secondary_button">
Continue Shopping</a>
<ul class="cart_items js-cart_items clearfix"></ul>
<hr>
<ul>
<li class="cart_subtotal js-cart_subtotal"> <span class="right"> <span class="money">$0.00</span></span> <span>Subtotal</span></li>
<li> <input type="submit" class="action_button" value="Go to cart"></li>
</ul>
</form>
POST /checkout
<form action="/checkout" method="post" data-money-format="${{amount}}" data-shop-currency="USD" data-shop-name="Hak5" class="js-cart_content__form hidden"> <a class="cart_content__continue-shopping secondary_button">
Continue Shopping</a>
<ul class="cart_items js-cart_items clearfix"></ul>
<hr>
<ul>
<li class="cart_subtotal js-cart_subtotal"> <span class="right"> <span class="money">$0.00</span></span> <span>Subtotal</span></li>
<li> <input type="submit" class="action_button" value="Go to cart"></li>
</ul>
</form>
POST /checkout
<form action="/checkout" method="post" data-money-format="${{amount}}" data-shop-currency="USD" data-shop-name="Hak5" class="js-cart_content__form hidden"> <a class="cart_content__continue-shopping secondary_button">
Continue Shopping</a>
<ul class="cart_items js-cart_items clearfix"></ul>
<hr>
<ul>
<li class="cart_subtotal js-cart_subtotal"> <span class="right"> <span class="money">$0.00</span></span> <span>Subtotal</span></li>
<li> <input type="submit" class="action_button" value="Go to cart"></li>
</ul>
</form>
<form class="springmod-form ng-pristine ng-valid"> <!-- ngRepeat: input in $ctrl.inputs -->
<div class="form-group ng-scope" ng-repeat="input in $ctrl.inputs" style=""> <!-- ngIf: !$ctrl.usePlaceholder --> <!-- ngIf: !$ctrl.usePlaceholder --> <!-- ngIf: $ctrl.usePlaceholder --><input ng-if="$ctrl.usePlaceholder" id="springmod_email"
type="email" name="Email"
style="width:100%;margin:0;border-width:1px;border-style:solid;border-color:#cccccc;border-radius:1px;font-family:\'Helvetica Neue\',Helvetica,Arial,sans-serif;font-size:16px;height:32px;line-height:1.5;padding:0px 9px 0px 9px;box-sizing:border-box;background-color:#ffffff;color:#000000;"
placeholder="Email" ondrop="event.preventDefault ? event.preventDefault() : event.returnValue = false" ng-required="$ctrl.nameRequired || input.type === \'email\'" class="ng-scope" required="required"><!-- end ngIf: $ctrl.usePlaceholder -->
</div> <!-- end ngRepeat: input in $ctrl.inputs -->
<div class="form-group">
<table style="table-layout:fixed;border-collapse:collapse;border-width:0;margin-top:0;margin-bottom:0;margin-right:0;margin-left:0;width:100%;background-color:#000000;color:#000000;padding-top:0;padding-right:0;padding-bottom:0;padding-left:0;">
<tbody>
<tr style="display:table-row;vertical-align:middle;border-width:0;border-color:transparent;border:0;background:transparent;">
<td align="center"
style="border-width:0;padding-top:0;padding-right:0;padding-bottom:0;padding-left:0;background:transparent;background-color:#000000;color:#000000;box-shadow:none;font-family:\'Helvetica Neue\',Helvetica,Arial,sans-serif;font-size:16px;font-weight:300;font-style:normal;text-transform:none;text-decoration:none;height:auto;line-height:1.5;text-align:center;opacity:1;text-shadow:none;">
<!-- ngIf: $ctrl.googleSiteKey && $ctrl.useCaptcha && $ctrl.canUseCaptcha --> <input id="springmod_submit" class="springmod_submit" value="Submit" type="submit"
style="width:150px;margin:0;border-width:1px;border-style:solid;border-color:#ec2028;border-radius:0px;font-family:\'Arial\',Helvetica,sans-serif;font-size:16px;line-height:1;padding:12px 0px;box-sizing:border-box;background-color:#ec2028;color:#ffffff;font-weight:400;text-shadow:none;text-transform:none;text-decoration:none;">
</td>
</tr> <!-- ngIf: $ctrl.showPrivacy && $ctrl.canUsePrivacyLink -->
</tbody>
</table>
</div> <!-- ngIf: $ctrl.showRestriction && $ctrl.canUseDoNotProcessDetails -->
<div class="springmod-spinner" id="springmod_spinner"></div>
</form>
<form class="springmod-form ng-pristine ng-valid"> <!-- ngRepeat: input in $ctrl.inputs -->
<div class="form-group ng-scope" ng-repeat="input in $ctrl.inputs" style=""> <!-- ngIf: !$ctrl.usePlaceholder --> <!-- ngIf: !$ctrl.usePlaceholder --> <!-- ngIf: $ctrl.usePlaceholder --><input ng-if="$ctrl.usePlaceholder" id="springmod_email"
type="email" name="Email"
style="width:100%;margin:0;border-width:1px;border-style:solid;border-color:#cccccc;border-radius:1px;font-family:\'Helvetica Neue\',Helvetica,Arial,sans-serif;font-size:16px;height:32px;line-height:1.5;padding:0px 9px 0px 9px;box-sizing:border-box;background-color:#ffffff;color:#000000;"
placeholder="Email" ondrop="event.preventDefault ? event.preventDefault() : event.returnValue = false" ng-required="$ctrl.nameRequired || input.type === \'email\'" class="ng-scope" required="required"><!-- end ngIf: $ctrl.usePlaceholder -->
</div> <!-- end ngRepeat: input in $ctrl.inputs -->
<div class="form-group">
<table style="table-layout:fixed;border-collapse:collapse;border-width:0;margin-top:0;margin-bottom:0;margin-right:0;margin-left:0;width:100%;background-color:#ffffff;color:#000000;padding-top:0;padding-right:0;padding-bottom:0;padding-left:0;">
<tbody>
<tr style="display:table-row;vertical-align:middle;border-width:0;border-color:transparent;border:0;background:transparent;">
<td align="center"
style="border-width:0;padding-top:0;padding-right:0;padding-bottom:0;padding-left:0;background:transparent;background-color:#ffffff;color:#000000;box-shadow:none;font-family:\'Helvetica Neue\',Helvetica,Arial,sans-serif;font-size:16px;font-weight:300;font-style:normal;text-transform:none;text-decoration:none;height:auto;line-height:1.5;text-align:center;opacity:1;text-shadow:none;">
<!-- ngIf: $ctrl.googleSiteKey && $ctrl.useCaptcha && $ctrl.canUseCaptcha --> <input id="springmod_submit" class="springmod_submit" value="Submit" type="submit"
style="width:150px;margin:0;border-width:1px;border-style:solid;border-color:#ec2028;border-radius:0px;font-family:\'Arial\',Helvetica,sans-serif;font-size:16px;line-height:1;padding:12px 0px;box-sizing:border-box;background-color:#ec2028;color:#ffffff;font-weight:400;text-shadow:none;text-transform:none;text-decoration:none;">
</td>
</tr> <!-- ngIf: $ctrl.showPrivacy && $ctrl.canUsePrivacyLink -->
</tbody>
</table>
</div> <!-- ngIf: $ctrl.showRestriction && $ctrl.canUseDoNotProcessDetails -->
<div class="springmod-spinner" id="springmod_spinner"></div>
</form>
POST /account/login
<form method="post" action="/account/login" style="display:inline-block;width:100%;padding-top:15px;margin:0px;" id="oxi_loginform_popup"><input type="hidden" value="customer_login" name="form_type"><input type="hidden" value="/a/oxisociallogin"
name="return_to"><input type="hidden" name="utf8" value="">
<div>
<div><span class="remodal-form-control"><input label="Email" value="" type="email" name="customer[email]" class="remodal-form-input" placeholder="Email" style="font-size:14px;" required=""></span></div>
<div><span class="remodal-form-control"><input label="Password" type="password" class="remodal-form-input" name="customer[password]" placeholder="Password" style="font-size:14px;" required=""></span></div>
</div>
<div class="submit_button_div" style="float:right;"><button type="submit" class="remodal-submit"><span><span>Login</span></span></button></div>
</form>
POST https://social-login.oxiapps.com/account/register
<form method="post" action="https://social-login.oxiapps.com/account/register" style="display:inline-block;width:100%;padding-top:15px;margin:0px;" id="oxi_registerform_popup"><input type="hidden" value="hakshop.myshopify.com" name="shop"><input
type="hidden" value="create_customer" name="form_type"><input type="hidden" value="/a/oxisociallogin" name="return_to"><input type="hidden" name="utf8" value="">
<div>
<div><span class="remodal-form-control"><input label="FirstName" value="" type="text" name="customer[first_name]" class="remodal-form-input" placeholder="First Name" style="font-size:14px;" required=""></span></div>
<div><span class="remodal-form-control"><input label="LastName" value="" type="text" name="customer[last_name]" class="remodal-form-input" placeholder="Last Name" style="font-size:14px;" required=""></span></div>
<div><span class="remodal-form-control"><input label="Email" value="" type="email" name="customer[email]" class="remodal-form-input" placeholder="Email" style="font-size:14px;" required=""></span></div>
<div><span class="remodal-form-control"><input label="Password" type="password" class="remodal-form-input" name="customer[password]" placeholder="Password" style="font-size:14px;" required=""></span></div>
</div>
<div class="submit_button_div" style="float:right;"><button type="submit" class="remodal-submit oxipopup_button_create">Create</button></div>
</form>
POST /account/recover
<form method="post" action="/account/recover" style="display:inline-block;width:100%;padding-top:15px;margin:0px;" id="oxipopup_recover_password"><input type="hidden" value="recover_customer_password" name="form_type"><input type="hidden"
value="/a/oxisociallogin" name="return_to"><input type="hidden" name="utf8" value="">
<div>
<div><span class="remodal-form-control"><input label="Email" value="" type="email" name="email" class="remodal-form-input" placeholder="Email" style="font-size:14px;" required=""></span></div>
</div>
<div class="submit_button_div" style="float:right;"><button type="submit" class="remodal-submit"><span><span>Submit</span></span></button></div>
</form>
Text Content
Products Podcasts 0 Your Cart is Empty Continue Shopping -------------------------------------------------------------------------------- * $0.00 Subtotal * Community Support * WIFI PENTESTING * WiFi Pineapple Mark VII * WiFi Pineapple Enterprise * REMOTE COMMAND & CONTROL * Cloud C² * HOTPLUG ATTACKS * USB Rubber Ducky * Bash Bunny * Shark Jack * Plunder Bug LAN Tap * GreatFET One * IMPLANTS & REMOTE ACCESS * Key Croc * Packet Squirrel * Screen Crab * LAN Turtle * O.MG Cable * FIELD KITS * Elite Series * Essential Series * EDUCATIONAL KITS * O.MG DemonSeed EDU * Throwing Star LAN Tap * MERCH * T-Shirts * Accessories * Stickers Hak5 – The longest running YouTube show defines Technolust ThreatWire – News on security, privacy, and internet freedom! Metasploit Minute – The break down on breaking in with Mubix HakTip – Essentials for new hackers, enthusiasts, and IT pros TRUST YOUR TECHNOLUST Since 2005 we've proclaimed our love for technology with this simple mantra – and we invite you to share in our passion. Welcome! Menu 0 Your Cart is Empty Continue Shopping -------------------------------------------------------------------------------- * $0.00 Subtotal * Your Cart is Empty Continue Shopping -------------------------------------------------------------------------------- * $0.00 Subtotal * * Products WIFI PENTESTING * WiFi Pineapple Mark VII * WiFi Pineapple Enterprise REMOTE COMMAND & CONTROL * Cloud C² HOTPLUG ATTACKS * USB Rubber Ducky * Bash Bunny * Shark Jack * Plunder Bug LAN Tap * GreatFET One IMPLANTS & REMOTE ACCESS * Key Croc * Packet Squirrel * Screen Crab * LAN Turtle * O.MG Cable FIELD KITS * Elite Series * Essential Series EDUCATIONAL KITS * O.MG DemonSeed EDU * Throwing Star LAN Tap MERCH * T-Shirts * Accessories * Stickers * Podcasts * Community * Support * Login 0 Your Cart is Empty Continue Shopping -------------------------------------------------------------------------------- * $0.00 Subtotal * * Login Products Podcasts Community Support * WIFI PENTESTING * WiFi Pineapple Mark VII * WiFi Pineapple Enterprise * REMOTE COMMAND & CONTROL * Cloud C² * HOTPLUG ATTACKS * USB Rubber Ducky * Bash Bunny * Shark Jack * Plunder Bug LAN Tap * GreatFET One * IMPLANTS & REMOTE ACCESS * Key Croc * Packet Squirrel * Screen Crab * LAN Turtle * O.MG Cable * FIELD KITS * Elite Series * Essential Series * EDUCATIONAL KITS * O.MG DemonSeed EDU * Throwing Star LAN Tap * MERCH * T-Shirts * Accessories * Stickers Hak5 – The longest running YouTube show defines Technolust ThreatWire – News on security, privacy, and internet freedom! Metasploit Minute – The break down on breaking in with Mubix HakTip – Essentials for new hackers, enthusiasts, and IT pros TRUST YOUR TECHNOLUST Since 2005 we've proclaimed our love for technology with this simple mantra – and we invite you to share in our passion. Welcome! * WIFI PENTESTING * WiFi Pineapple Mark VII * WiFi Pineapple Enterprise * REMOTE COMMAND & CONTROL * Cloud C² * HOTPLUG ATTACKS * USB Rubber Ducky * Bash Bunny * Shark Jack * Plunder Bug LAN Tap * GreatFET One * IMPLANTS & REMOTE ACCESS * Key Croc * Packet Squirrel * Screen Crab * LAN Turtle * O.MG Cable * FIELD KITS * Elite Series * Essential Series * EDUCATIONAL KITS * O.MG DemonSeed EDU * Throwing Star LAN Tap * MERCH * T-Shirts * Accessories * Stickers Hak5 – The longest running YouTube show defines Technolust ThreatWire – News on security, privacy, and internet freedom! Metasploit Minute – The break down on breaking in with Mubix HakTip – Essentials for new hackers, enthusiasts, and IT pros TRUST YOUR TECHNOLUST Since 2005 we've proclaimed our love for technology with this simple mantra – and we invite you to share in our passion. Welcome! Hak5 – The longest running YouTube show defines Technolust ThreatWire – News on security, privacy, and internet freedom! Metasploit Minute – The break down on breaking in with Mubix HakTip – Essentials for new hackers, enthusiasts, and IT pros TRUST YOUR TECHNOLUST Since 2005 we've proclaimed our love for technology with this simple mantra – and we invite you to share in our passion. Welcome! Access Denied IMPORTANT! If you’re a store owner, please make sure you have Customer accounts enabled in your Store Admin, as you have customer based locks set up with EasyLockdown app. Enable Customer Accounts SIGNATURE HAK5 GEAR WiFi Pineapple New WIFI PINEAPPLE The infamous rogue access point and WiFi pentest platform. Its simple web interface hosts an app ecosystem. As seen on Silicon Valley. from $14.99 USB Rubber Ducky USB RUBBER DUCKY A "flash drive" that types keystroke injection payloads into unsuspecting computers at incredible speeds. As seen on Mr. Robot. from $49.99 Bash Bunny New BASH BUNNY A quad-core Linux-box-on-USB-stick mimicking multiple trusted devices to deploy advanced pentest and IT automation payloads. from $119.99 Key Croc New KEY CROC A keylogger armed with pentest tools, remote access and payloads that trigger multi-vector attacks when chosen keywords are typed. from $99.99 Shark Jack New SHARK JACK Jack into a network and instantly run advanced recon, exfiltration, attack and automation payloads. from $69.99 LAN Turtle LAN TURTLE A Remote Access Toolkit posing as an ordinary USB Ethernet adapter. Drop it on a LAN for an instant backdoor shell. As seen on Mr. Robot. $79.99 Packet Squirrel PACKET SQUIRREL A matchbook-sized linux box packing multiple network payloads - like packet sniffing, VPN tunneling and man-in-the-middle attacks. $79.99 Plunder Bug LAN Tap PLUNDER BUG LAN TAP A pocket-sized Smart LAN Tap with USB-C convenience for passive monitoring or active engagements on wired networks. $79.99 Screen Crab SCREEN CRAB A stealthy video man-in-the-middle that captures screenshots or videos to disk and streams live to the Internet for remote viewing. $199.99 NEW Hak5 MERCH! 👕🧢 Celebrate 16 years of Technolust with all new Hak5 Merch, including the limited edition *.* collection! Stickers • Hats • Tees • Hoodies Shop All Merch GET REWARDED We know it takes a huge amount of time, energy and skill to make great payloads. That's why we want to honor them, share them with the world and reward you with up to $2,000 in Hak5 prizes. Enter now to get your payload in front of thousands. ENTER NOW -------------------------------------------------------------------------------- MISCHIEF GADGETS Exclusively at Hak5 — we've teamed up with MG to bring access to this previously clandestine attack hardware. SHOP MISCHIEF GADGETS Malicious Cable Detector by O.MG The O.MG Cable has arrived O.MG Cable - Lightning to USB-C New O.MG CABLE - LIGHTNING TO USB-C By Mischief Gadgets from $24.99 O.MG Cable - C-to-C Directional New O.MG CABLE - C-TO-C DIRECTIONAL By Mischief Gadgets from $24.99 O.MG Cable - * to USB-A O.MG CABLE - * TO USB-A By Mischief Gadgets from $19.99 Malicious Cable Detector by O.MG MALICIOUS CABLE DETECTOR BY O.MG By Mischief Gadgets $39.99 O.MG DemonSeed EDU O.MG DEMONSEED EDU By Mischief Gadgets from $19.99 O.MG DemonSeed Refill Kit O.MG DEMONSEED REFILL KIT By Mischief Gadgets $19.99 CLOUD C² Deploy Hak5 Gear and get on-site results from anywhere with a single web dashboard FEATURED MAKERS Keysy KEYSY By TinyLabs from $14.99 Ubertooth One UBERTOOTH ONE By Great Scott Gadgets Sold Out HackRF One with ANT500 Telescopic Antenna HACKRF ONE WITH ANT500 TELESCOPIC ANTENNA By Great Scott Gadgets Sold Out YARD Stick One with ANT500 Antenna YARD STICK ONE WITH ANT500 ANTENNA By Great Scott Gadgets Sold Out GreatFET One GREATFET ONE By Great Scott Gadgets Sold Out Throwing Star LAN Tap THROWING STAR LAN TAP By Great Scott Gadgets Sold Out Throwing Star LAN Tap Pro THROWING STAR LAN TAP PRO By Great Scott Gadgets Sold Out Acrylic Case for GreatFET One ACRYLIC CASE FOR GREATFET ONE By Great Scott Gadgets Sold Out Intervillage Badge INTERVILLAGE BADGE By Monero Devices $142.00 HackRF One PCB HACKRF ONE PCB By Great Scott Gadgets $219.99 LATEST PODCASTS Unfortunately, an error occurred: Hak5 • 730K Subscribers • 1.7K Videos • 57M Views Latest episodes from Hak5 podcasts * Hak5 08:47 HakByte: Gather WiFi Reconnaissance on this $5 MicroController 8/19/2021 Hak5 -- Cyber Security Education, Inspiration, News & Community since 2005: In this video, Alex Lynd demonstrates how you can use a $5 microcontroller to get started with WiFi reconnaissance by utilizing monitor mode on the ESP8266. This allows us to cheaply survey the wireless landscape around us, and determine nearby WiFi activity with a simple Arduino sketch that also saves gathered information on an SD card. GitHub Repository: https://github.com/AlexLynd/ESPProLib-Demos Ricardo Oliveira's ESP Pro Library: https://github.com/RicardoOliveira/ESPProLib Alex's Website: http://alexlynd.com Links to Hardware: ESP8266 D1 Mini: https://amzn.to/3miu2Rw D1 Mini SD Module: https://amzn.to/3gebzBO Chapters: 00:00 Intro 00:18 What is the ESP8266? 00:41 What is Monitor Mode? 01:21 ESP Pro Library 03:55 Monitor Mode on the ESP8266 04:53 SD Logger Code 06:16 D1 Mini SD Card Logger 07:25 CSV Capture File 07:52 Outro -----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆ Our Site → https://www.hak5.org Shop → http://hakshop.myshopify.com/ Subscribe → https://www.youtube.com/user/Hak5Darren?sub_confirmation=1 Support → https://www.patreon.com/threatwire Contact Us → http://www.twitter.com/hak5 Threat Wire RSS → https://shannonmorse.podbean.com/feed/ Threat Wire iTunes → https://itunes.apple.com/us/podcast/threat-wire/id1197048999 -----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆ ____________________________________________ Founded in 2005, Hak5's mission is to advance the InfoSec industry. We do this through our award winning educational podcasts, leading pentest gear, and inclusive community – where all hackers belong. • 16K Views • 825 Likes • 63 Comments 09:34 The Biggest Cryptocurrency Hack Ever - Why Did It Happen? - ThreatWire 8/17/2021 Support ThreatWire! https://www.patreon.com/threatwire Shop ThreatWire Merch Directly! - https://snubsie.com/shop Hak5 -- Cyber Security Education, Inspiration, News & Community since 2005: Is this the biggest crypto hack ever? Print Spooler is an actual Nightmare, and a hacker claims t-mobile data was stolen in a server hack! All that coming up now on ThreatWire. #threatwire #hak5 Links: Weekly security and privacy news, brought to you by Shannon Morse. ThreatWire is a weekly news journalism show covering security and privacy topics for network admins and users. Watch this on youtube (video may be “private” until the scheduled publish time): https://youtu.be/UW38I60EmX4 Shop ThreatWire Merch Directly! - https://snubsie.com/shop Shop ThreatWire Merch on Teespring! - https://morsecode.creator-spring.com/ Support ThreatWire! https://www.patreon.com/threatwire Links: Read all the links via the RSS feed: https://shannonmorse.podbean.com/ Due to Youtube’s bots flagging my source links as “hacking”, you can now find all future link databases via the RSS link (down below) and via the the ThreatWire patreon page (each video post for each episode is a public post and you do not have to be a member to view these). -----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆ Our Site → https://www.hak5.org Shop → http://hakshop.myshopify.com/ Subscribe → https://www.youtube.com/user/Hak5Darren?sub_confirmation=1 Support → https://www.patreon.com/threatwire Contact Us → http://www.twitter.com/hak5 Threat Wire RSS → https://shannonmorse.podbean.com/feed/ Threat Wire iTunes → https://itunes.apple.com/us/podcast/threat-wire/id1197048999 -----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆ ____________________________________________ Founded in 2005, Hak5's mission is to advance the InfoSec industry. We do this through our award winning educational podcasts, leading pentest gear, and inclusive community – where all hackers belong. • 18K Views • 1.1K Likes • 449 Comments 11:13 HakByte: Practice Hash Recovery Online with Google Colab 8/12/2021 In this episode, Alex Lynd demonstrates how beginners can learn about hash recovery in the cloud using HashCat and Google Colab, a free machine learning service. Note: Some commenters have pointed out this could cause your Google account to be blocked, so please read the terms of service and avoid using any important Google account for learning Hashcat. GitHub Repository: https://github.com/AlexLynd/Colab-Tools HashCat Hash Reference: https://hashcat.net/wiki/doku.php?id=example_hashes Alex's Website: http://alexlynd.com Chapters: 00:00 Intro 00:19 What is Google Colab? 00:44 Set Up Colab for Hash Recovery 02:01 Generate a Test Hashes to Crack 04:40 Jupyter Notebook Password Recovery Script Overview 08:09 Recovering Salted MD5 Hashes w/ HashCat 10:40 Outro -----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆ Our Site → https://www.hak5.org Shop → http://hakshop.myshopify.com/ Subscribe → https://www.youtube.com/user/Hak5Darren?sub_confirmation=1 Support → https://www.patreon.com/threatwire Contact Us → http://www.twitter.com/hak5 Threat Wire RSS → https://shannonmorse.podbean.com/feed/ Threat Wire iTunes → https://itunes.apple.com/us/podcast/threat-wire/id1197048999 -----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆ ____________________________________________ Founded in 2005, Hak5's mission is to advance the InfoSec industry. We do this through our award winning educational podcasts, leading pentest gear, and inclusive community – where all hackers belong. • 10K Views • 559 Likes • 102 Comments 18:02 Planning a Continuous Recon Platform | /dev/hack s01e01 8/11/2021 Join your hosts dade and Adam as they discuss the goals for the first season of /dev/hack -- planning and building a continuous reconnaissance platform. XKCD Comic: https://xkcd.com/1172/ Project Repository: https://github.com/natlas/natlas Patreon: https://patreon.com/devslashhack Hak5: https://hak5.org dade: https://twitter.com/0xdade adam: https://twitter.com/rubyonnails If you have any questions, comments, concerns, ad hominem attacks, please feel free to email us at devhack@hak5.org. Hak5 -- Cyber Security Education, Inspiration, News & Community since 2005: -----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆ Our Site → https://www.hak5.org Shop → http://hakshop.myshopify.com/ Subscribe → https://www.youtube.com/user/Hak5Darren?sub_confirmation=1 Support → https://www.patreon.com/threatwire Contact Us → http://www.twitter.com/hak5 Threat Wire RSS → https://shannonmorse.podbean.com/feed/ Threat Wire iTunes → https://itunes.apple.com/us/podcast/threat-wire/id1197048999 -----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆ ____________________________________________ Founded in 2005, Hak5's mission is to advance the InfoSec industry. We do this through our award winning educational podcasts, leading pentest gear, and inclusive community – where all hackers belong. • 6.6K Views • 381 Likes • 23 Comments 13:17 Is Apple’s New CSAM Scanning Tech Privacy Invasive? - ThreatWire 8/10/2021 Stealing audio through LEDs, is Apple’s new CSAM scanning tech privacy invasive? and Synology warns of botnet malware! All that coming up now on ThreatWire. #threatwire #hak5 Links: Weekly security and privacy news, brought to you by Shannon Morse. ThreatWire is a weekly news journalism show covering security and privacy topics for network admins and users. Watch this on youtube (video may be “private” until the scheduled publish time): https://youtu.be/75XYa3dKals Shop ThreatWire Merch Directly! - https://snubsie.com/shop Shop ThreatWire Merch on Teespring! - https://morsecode.creator-spring.com/ Support ThreatWire! https://www.patreon.com/threatwire Links: Read all the links via the RSS feed: https://shannonmorse.podbean.com/ Due to Youtube’s bots flagging my source links as “hacking”, you can now find all future link databases via the RSS link (down below) and via the the ThreatWire patreon page (each video post for each episode is a public post and you do not have to be a member to view these). -----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆ Our Site → https://www.hak5.org Shop → http://hakshop.myshopify.com/ Subscribe → https://www.youtube.com/user/Hak5Darren?sub_confirmation=1 Support → https://www.patreon.com/threatwire Contact Us → http://www.twitter.com/hak5 Threat Wire RSS → https://shannonmorse.podbean.com/feed/ Threat Wire iTunes → https://itunes.apple.com/us/podcast/threat-wire/id1197048999 Host: Shannon Morse → https://www.twitter.com/snubs Host: Darren Kitchen → https://www.twitter.com/hak5darren Host: Mubix → http://www.twitter.com/mubix -----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆ • 14K Views • 1K Likes • 123 Comments 06:04 Remote 3D Printing with Cura and Octorprint w/Glytch 8/9/2021 Glytch is back with another episode in the series on hacking a 3D Printer to make better than before! Wireless 3d printing with Octoprint for Cura...this time on Hak5! Previous Octoprint Episode: https://www.youtube.com/watch?v=FHggrQDHCz8 Pineapple Badge 3D Model: https://www.thingiverse.com/thing:4613252/ Hardware: Glytch's Favorite 3D Printer: https://amzn.to/3y8PU4E Raspberry Pi 3B+: https://amzn.to/3x89bls Raspberry Pi 4 (Recommended): https://amzn.to/3eUNvmM As an Amazon Associate, Glytch earns from qualifying purchases through the links above at no extra cost to you. Social Media: Glytch's Twitter: https://twitter.com/GlytchTech Glytch's Instagram: https://instagram.com/GlytchTech Glytch's Website: http://glytch.tech Glytch's Youtube: https://youtube.com/glytch • 4.5K Views • 220 Likes • 24 Comments 01:51:11 Chat with the OMG Dev Team 8/6/2021 The team behind the O.MG Cable is here to chat about their work. A look behind the scenes over the last few years, what they are up to now, and open Q&A. • 5.9K Views • 293 Likes • 9 Comments 04:06:00 Hak5 LIVE: 16th Anniversary Celebration 8/6/2021 Since August 5, 2005 we've been reminding you to Trust your Technolust. On this sweet sixteen we invite you to join Hak5 hosts, developers & friends for a live stream celebration! • 5.8K Views • 462 Likes • 29 Comments 11:15 HakByte: Capture Wi-Fi Passwords From Smartphones with a Half-Handshake Attack 8/5/2021 In this episode, we show how hackers can abuse convenience features of Wi-Fi to extract passwords from nearby smartphones belonging to Wi-Fi networks they've connected to in the past. -----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆ Our Site → https://www.hak5.org Shop → http://hakshop.myshopify.com/ Subscribe → https://www.youtube.com/user/Hak5Darren?sub_confirmation=1 Support → https://www.patreon.com/threatwire Contact Us → http://www.twitter.com/hak5 Threat Wire RSS → https://shannonmorse.podbean.com/feed/ Threat Wire iTunes → https://itunes.apple.com/us/podcast/threat-wire/id1197048999 Host: Shannon Morse → https://www.twitter.com/snubs Host: Darren Kitchen → https://www.twitter.com/hak5darren Host: Mubix → http://www.twitter.com/mubix -----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆ • 47K Views • 2.8K Likes • 215 Comments 08:53 Meteor Malware Disrupts Trains, PwnedPiper Targets Hospital Systems, DarkSide is Back! - ThreatWire 8/3/2021 PwnedPiper Threatens Hospitals, Meteor Malware Causes a Train Disruption, and BlackMatter is the new DarkSide! All that coming up now on ThreatWire. #threatwire #hak5 Links: Weekly security and privacy news, brought to you by Shannon Morse. ThreatWire is a weekly news journalism show covering security and privacy topics for network admins and users. Watch this on youtube (video may be “private” until the scheduled publish time): https://youtu.be/5ofYqjC1s40 Shop ThreatWire Merch Directly! - https://snubsie.com/shop Shop ThreatWire Merch on Teespring! - https://morsecode.creator-spring.com/ Support ThreatWire! https://www.patreon.com/threatwire Links: Due to Youtube’s bots flagging my source links as “hacking”, you can now find all future link databases via the RSS link (down below) and via the the ThreatWire patreon page (each video post for each episode is a public post and you do not have to be a member to view these). -----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆ Our Site → https://www.hak5.org Shop → http://hakshop.myshopify.com/ Subscribe → https://www.youtube.com/user/Hak5Darren?sub_confirmation=1 Support → https://www.patreon.com/threatwire Contact Us → http://www.twitter.com/hak5 Threat Wire RSS → https://shannonmorse.podbean.com/feed/ Threat Wire iTunes → https://itunes.apple.com/us/podcast/threat-wire/id1197048999 Host: Shannon Morse → https://www.twitter.com/snubs Host: Darren Kitchen → https://www.twitter.com/hak5darren Host: Mubix → http://www.twitter.com/mubix -----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆ • 13K Views • 943 Likes • 40 Comments 16:04 Hacking a Wii Nunchuk for Big Robots w/Glytch 8/2/2021 Glytch is back with more hacked video game controllers. In particular, a nunchuk is on the chopping block as they get their robot on...this time, on Hak5! Resources: https://www.patreon.com/posts/hacking-wii-for-54406935 ===Hardware=== Nunchuk: https://amzn.to/3llRvkm Alternatively Generic Nunchuk - color code may differ, check wiring: https://amzn.to/3ykZ0LM Arduino Nano: https://amzn.to/3zZwQqd NRF24L01: https://amzn.to/3lkK50z Alternatively for more range - NRF24L01 w/ PA&LNA: https://amzn.to/2WAKBx2 AMS1117: https://amzn.to/3xcvhn2 As an Amazon Associate, Glytch earns from qualifying purchases through the links above at no extra cost to you. Social Media: Glytch's Twitter: https://twitter.com/GlytchTech Glytch's Patreon: https://www.patreon.com/glytchtech Glytch's Instagram: https://instagram.com/GlytchTech Glytch's Website: http://glytch.tech Glytch's Youtube: https://youtube.com/glytch • 6.6K Views • 377 Likes • 41 Comments 14:59 HakByte: How to use Postman to Reverse Engineer Private APIs 7/30/2021 In this episode we’ll show how to use Chrome or Firefox along with Postman to go from a website using a private API all the way to Python code. -----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆ Our Site → https://www.hak5.org Shop → http://hakshop.myshopify.com/ Subscribe → https://www.youtube.com/user/Hak5Darren?sub_confirmation=1 Support → https://www.patreon.com/threatwire Contact Us → http://www.twitter.com/hak5 Threat Wire RSS → https://shannonmorse.podbean.com/feed/ Threat Wire iTunes → https://itunes.apple.com/us/podcast/threat-wire/id1197048999 Host: Michael Raymond → https://www.twitter.com/the_hoid -----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆ • 16K Views • 906 Likes • 62 Comments 09:45 Pegasus Project Reveals Phone Spyware Targets - ThreatWire 7/27/2021 The REvil Decryption Key is Obtained, Windows & Linux are Vulnerable to Privilege Escalation Attacks, and the Pegasus Project Reveals Phone Spyware Targeting! All that coming up now on ThreatWire. #threatwire #hak5 Links: Weekly security and privacy news, brought to you by Shannon Morse. ThreatWire is a weekly news journalism show covering security and privacy topics for network admins and users. Watch this on youtube: https://youtu.be/mJfCTJRs1io Shop ThreatWire Merch Directly! - https://snubsie.com/shop Shop ThreatWire Merch on Teespring! - https://morsecode.creator-spring.com/ Support ThreatWire! https://www.patreon.com/threatwire Links: Due to Youtube’s bots flagging my source links as “hacking”, you can now find all future link databases via the RSS link (down below) and via the the ThreatWire patreon page (each video post for each episode is a public post and you do not have to be a member to view these). Photo credit: https://p1.pxfuel.com/preview/325/241/266/horse-with-wings-pegasus-myth-sunset.jpg -----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆ Our Site → https://www.hak5.org Shop → http://hakshop.myshopify.com/ Subscribe → https://www.youtube.com/user/Hak5Darren?sub_confirmation=1 Support → https://www.patreon.com/threatwire Contact Us → http://www.twitter.com/hak5 Threat Wire RSS → https://shannonmorse.podbean.com/feed/ Threat Wire iTunes → https://itunes.apple.com/us/podcast/threat-wire/id1197048999 Host: Shannon Morse → https://www.twitter.com/snubs Host: Darren Kitchen → https://www.twitter.com/hak5darren Host: Mubix → http://www.twitter.com/mubix -----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆ • 23K Views • 1.6K Likes • 82 Comments 09:49 Wireless 3D Printing using OctoPrint w/Glytch 7/26/2021 Glytch is coming at you with a series on hacking a 3D Printer to make it even betterer than before! Servers, wifi, and cameras oh my....and also something about octopi? octopusses?...this time on Hak5! Glytch's Favorite 3D Printer: https://amzn.to/3y8PU4E Raspberry Pi 3B+: https://amzn.to/3x89bls Raspberry Pi 4 (Recommended): https://amzn.to/3eUNvmM As an Amazon Associate, Glytch earns from qualifying purchases through the links above at no extra cost to you. Social Media: Glytch's Twitter: https://twitter.com/GlytchTech Glytch's Instagram: https://instagram.com/GlytchTech Glytch's Website: http://glytch.tech Glytch's Youtube: https://youtube.com/glytch • 6.4K Views • 368 Likes • 26 Comments 18:35 HakByte: Use Android Studio to Learn Android App Security Part 3 7/22/2021 In this episode, you are going to continue using our vulnerable android virtual device to learn about android application hacking. -----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆ Our Site → https://www.hak5.org Shop → http://hakshop.myshopify.com/ Subscribe → https://www.youtube.com/user/Hak5Darren?sub_confirmation=1 Support → https://www.patreon.com/threatwire Contact Us → http://www.twitter.com/hak5 Threat Wire RSS → https://shannonmorse.podbean.com/feed/ Threat Wire iTunes → https://itunes.apple.com/us/podcast/threat-wire/id1197048999 Host: Shannon Morse → https://www.twitter.com/snubs Host: Darren Kitchen → https://www.twitter.com/hak5darren Host: Mubix → http://www.twitter.com/mubix -----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆ • 5.9K Views • 269 Likes • 27 Comments 11:19 A Look at Glytch's Pocket Hardware Hacking Kit 7/19/2021 Glytch is back again, this time with a cursed video! You read that right, this one has been a bit of a problem...But it's here, sit back, relax, and watch Glytch ramble on about another mishmash of hardware in a fabric package, this time on Hak5! Gear links: Hak5 Wrap: https://shop.hak5.org/products/hak5-essential-equipment-wrap Tweezers: https://amzn.to/3kvRRUU Side Cutters: https://amzn.to/3kxwpyI Electric Screwdriver: https://amzn.to/3kAo8ds Thick Lead Mechanical Pencil: https://amzn.to/3kEp6Fs Solder Flux Pen: https://amzn.to/3ikTLVS Solder: https://amzn.to/3xSr1Ko TS80P Soldering Iron: https://amzn.to/3ezilRB As an Amazon Associate, Glytch earns from qualifying purchases through the links above at no extra cost to you. Social Media: Glytch's Twitter: https://twitter.com/GlytchTech Glytch's Instagram: https://instagram.com/GlytchTech Glytch's Website: http://glytch.tech Glytch's Youtube: https://youtube.com/glytch • 20K Views • 996 Likes • 81 Comments 12 HAK5: EQUIPPING INFOSEC PROS Founded in 2005, Hak5's mission is to advance the InfoSec industry. We do this through our award winning podcasts, leading pentest gear, and inclusive community – where all hackers belong. WIFI PENTESTS Reconnissance and interception with the famous WiFi Pineapple SHOP WIFI PENTESTS HOTPLUG ATTACKS The most advanced attacks in just seconds SHOP HOTPLUG ATTACKS ON-SITE IMPLANTS Stealthy Remote Access toolkits, Man-in-the-middle and Near Access Operations SHOP ON-SITE IMPLANTS FIELD KITS Arm your Red Team with field proven pentest gear SHOP FIELD KITS Sign up for sales, new releases, payloads and more… THANK YOU! We'll send you great deals and more! * * * * * INFORMATION * About * Shop Policy * Privacy Policy * Terms of Service EXPLORE * Guides * Sponsorship * Media Inquiry * Global Authorized Resellers SERVICE * Contact * Track your Order * Invoice Lookup * Quotes & Tax-Exempt Orders ABOUT Founded in 2005, Hak5's mission is to advance the InfoSec industry. We do this through our award winning podcasts, leading pentest gear, and inclusive community – where all hackers belong. * * * * * -------------------------------------------------------------------------------- Pentest tools for authorized auditing/security analysis only where permitted. Subject to local and international laws where applicable. Users solely responsible for compliance. Classification unrestricted: MMKT ECCN 5D992.c NLR CCATS # self-class* for BIS license exception ENC favorable treatment countries (US 15 CFR Supplement No 3 to Part 740). HTSUS. Hak5 LLC, 548 Market Street #39371, San Francisco, CA 94104 DUNS #: 06-841-3898 shop@hak5.org Copyright Hak5 LLC SIGN UP TODAY Get the inside scoop on the latest releases, events, popular payloads and Hak5 Gear tips! THANK YOU! We'll send you great deals and more! LOGIN or Login Forgot Password Create Account CREATE ACCOUNT or Create Already Have an Account? Login! RESET YOUR PASSWORD We will send you an email to reset your password. We've sent you an email with a link to update your password. Submit Cancel × We Value Your Privacy Settings NextRoll, Inc. ("NextRoll") and our advertising partners use cookies and similar technologies on this site and around the web to collect and use personal data (e.g., your IP address). If you consent, the cookies, device identifiers, or other information can be stored or accessed on your device for the purposes described below. You can click "Allow All" or "Decline All" or click Settings above to customize your consent. NextRoll and our advertising partners process personal data to: ● Store and/or access information on a device; ● Create a personalized content profile; ● Select personalised content; ● Personalized ads, ad measurement and audience insights; ● Product development. For some of the purposes above, our advertising partners: ● Use precise geolocation data. Some of our partners rely on their legitimate business interests to process personal data. View our advertising partners to see the purposes they believe they have a legitimate interest for and how you can object to such processing. Your changes on this site will be applied across the internet on any digital property you visit using NextRoll's technology. If you select Decline All, you will still be able to view content on this site and you will still receive advertising, but the advertising will not be tailored for you. You may change your setting whenever you see Decline All Allow All