hak5.org Open in urlscan Pro
23.227.38.65  Public Scan

Submitted URL: http://hak5.org/
Effective URL: https://hak5.org/
Submission: On August 23 via api from CA

Form analysis 9 forms found in the DOM

POST /checkout

<form action="/checkout" method="post" data-money-format="${{amount}}" data-shop-currency="USD" data-shop-name="Hak5" class="js-cart_content__form hidden"> <a class="cart_content__continue-shopping secondary_button">
                  Continue Shopping</a>
  <ul class="cart_items js-cart_items clearfix"></ul>
  <hr>
  <ul>
    <li class="cart_subtotal js-cart_subtotal"> <span class="right"> <span class="money">$0.00</span></span> <span>Subtotal</span></li>
    <li> <input type="submit" class="action_button" value="Go to cart"></li>
  </ul>
</form>

POST /checkout

<form action="/checkout" method="post" data-money-format="${{amount}}" data-shop-currency="USD" data-shop-name="Hak5" class="js-cart_content__form hidden"> <a class="cart_content__continue-shopping secondary_button">
                  Continue Shopping</a>
  <ul class="cart_items js-cart_items clearfix"></ul>
  <hr>
  <ul>
    <li class="cart_subtotal js-cart_subtotal"> <span class="right"> <span class="money">$0.00</span></span> <span>Subtotal</span></li>
    <li> <input type="submit" class="action_button" value="Go to cart"></li>
  </ul>
</form>

POST /checkout

<form action="/checkout" method="post" data-money-format="${{amount}}" data-shop-currency="USD" data-shop-name="Hak5" class="js-cart_content__form hidden"> <a class="cart_content__continue-shopping secondary_button">
                  Continue Shopping</a>
  <ul class="cart_items js-cart_items clearfix"></ul>
  <hr>
  <ul>
    <li class="cart_subtotal js-cart_subtotal"> <span class="right"> <span class="money">$0.00</span></span> <span>Subtotal</span></li>
    <li> <input type="submit" class="action_button" value="Go to cart"></li>
  </ul>
</form>

POST /checkout

<form action="/checkout" method="post" data-money-format="${{amount}}" data-shop-currency="USD" data-shop-name="Hak5" class="js-cart_content__form hidden"> <a class="cart_content__continue-shopping secondary_button">
                  Continue Shopping</a>
  <ul class="cart_items js-cart_items clearfix"></ul>
  <hr>
  <ul>
    <li class="cart_subtotal js-cart_subtotal"> <span class="right"> <span class="money">$0.00</span></span> <span>Subtotal</span></li>
    <li> <input type="submit" class="action_button" value="Go to cart"></li>
  </ul>
</form>

<form class="springmod-form ng-pristine ng-valid"> <!-- ngRepeat: input in $ctrl.inputs -->
  <div class="form-group ng-scope" ng-repeat="input in $ctrl.inputs" style=""> <!-- ngIf: !$ctrl.usePlaceholder --> <!-- ngIf: !$ctrl.usePlaceholder --> <!-- ngIf: $ctrl.usePlaceholder --><input ng-if="$ctrl.usePlaceholder" id="springmod_email"
      type="email" name="Email"
      style="width:100%;margin:0;border-width:1px;border-style:solid;border-color:#cccccc;border-radius:1px;font-family:\'Helvetica Neue\',Helvetica,Arial,sans-serif;font-size:16px;height:32px;line-height:1.5;padding:0px 9px 0px 9px;box-sizing:border-box;background-color:#ffffff;color:#000000;"
      placeholder="Email" ondrop="event.preventDefault ? event.preventDefault() : event.returnValue = false" ng-required="$ctrl.nameRequired || input.type === \'email\'" class="ng-scope" required="required"><!-- end ngIf: $ctrl.usePlaceholder -->
  </div> <!-- end ngRepeat: input in $ctrl.inputs -->
  <div class="form-group">
    <table style="table-layout:fixed;border-collapse:collapse;border-width:0;margin-top:0;margin-bottom:0;margin-right:0;margin-left:0;width:100%;background-color:#000000;color:#000000;padding-top:0;padding-right:0;padding-bottom:0;padding-left:0;">
      <tbody>
        <tr style="display:table-row;vertical-align:middle;border-width:0;border-color:transparent;border:0;background:transparent;">
          <td align="center"
            style="border-width:0;padding-top:0;padding-right:0;padding-bottom:0;padding-left:0;background:transparent;background-color:#000000;color:#000000;box-shadow:none;font-family:\'Helvetica Neue\',Helvetica,Arial,sans-serif;font-size:16px;font-weight:300;font-style:normal;text-transform:none;text-decoration:none;height:auto;line-height:1.5;text-align:center;opacity:1;text-shadow:none;">
            <!-- ngIf: $ctrl.googleSiteKey && $ctrl.useCaptcha && $ctrl.canUseCaptcha --> <input id="springmod_submit" class="springmod_submit" value="Submit" type="submit"
              style="width:150px;margin:0;border-width:1px;border-style:solid;border-color:#ec2028;border-radius:0px;font-family:\'Arial\',Helvetica,sans-serif;font-size:16px;line-height:1;padding:12px 0px;box-sizing:border-box;background-color:#ec2028;color:#ffffff;font-weight:400;text-shadow:none;text-transform:none;text-decoration:none;">
          </td>
        </tr> <!-- ngIf: $ctrl.showPrivacy && $ctrl.canUsePrivacyLink -->
      </tbody>
    </table>
  </div> <!-- ngIf: $ctrl.showRestriction && $ctrl.canUseDoNotProcessDetails -->
  <div class="springmod-spinner" id="springmod_spinner"></div>
</form>

<form class="springmod-form ng-pristine ng-valid"> <!-- ngRepeat: input in $ctrl.inputs -->
  <div class="form-group ng-scope" ng-repeat="input in $ctrl.inputs" style=""> <!-- ngIf: !$ctrl.usePlaceholder --> <!-- ngIf: !$ctrl.usePlaceholder --> <!-- ngIf: $ctrl.usePlaceholder --><input ng-if="$ctrl.usePlaceholder" id="springmod_email"
      type="email" name="Email"
      style="width:100%;margin:0;border-width:1px;border-style:solid;border-color:#cccccc;border-radius:1px;font-family:\'Helvetica Neue\',Helvetica,Arial,sans-serif;font-size:16px;height:32px;line-height:1.5;padding:0px 9px 0px 9px;box-sizing:border-box;background-color:#ffffff;color:#000000;"
      placeholder="Email" ondrop="event.preventDefault ? event.preventDefault() : event.returnValue = false" ng-required="$ctrl.nameRequired || input.type === \'email\'" class="ng-scope" required="required"><!-- end ngIf: $ctrl.usePlaceholder -->
  </div> <!-- end ngRepeat: input in $ctrl.inputs -->
  <div class="form-group">
    <table style="table-layout:fixed;border-collapse:collapse;border-width:0;margin-top:0;margin-bottom:0;margin-right:0;margin-left:0;width:100%;background-color:#ffffff;color:#000000;padding-top:0;padding-right:0;padding-bottom:0;padding-left:0;">
      <tbody>
        <tr style="display:table-row;vertical-align:middle;border-width:0;border-color:transparent;border:0;background:transparent;">
          <td align="center"
            style="border-width:0;padding-top:0;padding-right:0;padding-bottom:0;padding-left:0;background:transparent;background-color:#ffffff;color:#000000;box-shadow:none;font-family:\'Helvetica Neue\',Helvetica,Arial,sans-serif;font-size:16px;font-weight:300;font-style:normal;text-transform:none;text-decoration:none;height:auto;line-height:1.5;text-align:center;opacity:1;text-shadow:none;">
            <!-- ngIf: $ctrl.googleSiteKey && $ctrl.useCaptcha && $ctrl.canUseCaptcha --> <input id="springmod_submit" class="springmod_submit" value="Submit" type="submit"
              style="width:150px;margin:0;border-width:1px;border-style:solid;border-color:#ec2028;border-radius:0px;font-family:\'Arial\',Helvetica,sans-serif;font-size:16px;line-height:1;padding:12px 0px;box-sizing:border-box;background-color:#ec2028;color:#ffffff;font-weight:400;text-shadow:none;text-transform:none;text-decoration:none;">
          </td>
        </tr> <!-- ngIf: $ctrl.showPrivacy && $ctrl.canUsePrivacyLink -->
      </tbody>
    </table>
  </div> <!-- ngIf: $ctrl.showRestriction && $ctrl.canUseDoNotProcessDetails -->
  <div class="springmod-spinner" id="springmod_spinner"></div>
</form>

POST /account/login

<form method="post" action="/account/login" style="display:inline-block;width:100%;padding-top:15px;margin:0px;" id="oxi_loginform_popup"><input type="hidden" value="customer_login" name="form_type"><input type="hidden" value="/a/oxisociallogin"
    name="return_to"><input type="hidden" name="utf8" value="">
  <div>
    <div><span class="remodal-form-control"><input label="Email" value="" type="email" name="customer[email]" class="remodal-form-input" placeholder="Email" style="font-size:14px;" required=""></span></div>
    <div><span class="remodal-form-control"><input label="Password" type="password" class="remodal-form-input" name="customer[password]" placeholder="Password" style="font-size:14px;" required=""></span></div>
  </div>
  <div class="submit_button_div" style="float:right;"><button type="submit" class="remodal-submit"><span><span>Login</span></span></button></div>
</form>

POST https://social-login.oxiapps.com/account/register

<form method="post" action="https://social-login.oxiapps.com/account/register" style="display:inline-block;width:100%;padding-top:15px;margin:0px;" id="oxi_registerform_popup"><input type="hidden" value="hakshop.myshopify.com" name="shop"><input
    type="hidden" value="create_customer" name="form_type"><input type="hidden" value="/a/oxisociallogin" name="return_to"><input type="hidden" name="utf8" value="">
  <div>
    <div><span class="remodal-form-control"><input label="FirstName" value="" type="text" name="customer[first_name]" class="remodal-form-input" placeholder="First Name" style="font-size:14px;" required=""></span></div>
    <div><span class="remodal-form-control"><input label="LastName" value="" type="text" name="customer[last_name]" class="remodal-form-input" placeholder="Last Name" style="font-size:14px;" required=""></span></div>
    <div><span class="remodal-form-control"><input label="Email" value="" type="email" name="customer[email]" class="remodal-form-input" placeholder="Email" style="font-size:14px;" required=""></span></div>
    <div><span class="remodal-form-control"><input label="Password" type="password" class="remodal-form-input" name="customer[password]" placeholder="Password" style="font-size:14px;" required=""></span></div>
  </div>
  <div class="submit_button_div" style="float:right;"><button type="submit" class="remodal-submit oxipopup_button_create">Create</button></div>
</form>

POST /account/recover

<form method="post" action="/account/recover" style="display:inline-block;width:100%;padding-top:15px;margin:0px;" id="oxipopup_recover_password"><input type="hidden" value="recover_customer_password" name="form_type"><input type="hidden"
    value="/a/oxisociallogin" name="return_to"><input type="hidden" name="utf8" value="">
  <div>
    <div><span class="remodal-form-control"><input label="Email" value="" type="email" name="email" class="remodal-form-input" placeholder="Email" style="font-size:14px;" required=""></span></div>
  </div>
  <div class="submit_button_div" style="float:right;"><button type="submit" class="remodal-submit"><span><span>Submit</span></span></button></div>
</form>

Text Content

Products Podcasts


0

Your Cart is Empty

Continue Shopping

--------------------------------------------------------------------------------

 * $0.00 Subtotal
 * 

Community Support

 * WIFI PENTESTING

 * WiFi Pineapple Mark VII
 * WiFi Pineapple Enterprise

 * REMOTE COMMAND & CONTROL

 * Cloud C²



 * HOTPLUG ATTACKS

 * USB Rubber Ducky
 * Bash Bunny
 * Shark Jack
 * Plunder Bug LAN Tap
 * GreatFET One



 * IMPLANTS & REMOTE ACCESS

 * Key Croc
 * Packet Squirrel
 * Screen Crab
 * LAN Turtle
 * O.MG Cable



 * FIELD KITS

 * Elite Series
 * Essential Series

 * EDUCATIONAL KITS

 * O.MG DemonSeed EDU
 * Throwing Star LAN Tap



 * MERCH

 * T-Shirts
 * Accessories
 * Stickers



Hak5 – The longest running YouTube show defines Technolust

ThreatWire – News on security, privacy, and internet freedom!

Metasploit Minute – The break down on breaking in with Mubix

HakTip – Essentials for new hackers, enthusiasts, and IT pros

TRUST YOUR TECHNOLUST

Since 2005 we've proclaimed our love for technology with this simple mantra –
and we invite you to share in our passion. Welcome!





Menu
0

Your Cart is Empty

Continue Shopping

--------------------------------------------------------------------------------

 * $0.00 Subtotal
 * 

Your Cart is Empty

Continue Shopping

--------------------------------------------------------------------------------

 * $0.00 Subtotal
 * 

 * Products
   
   
   
   WIFI PENTESTING
   * WiFi Pineapple Mark VII
   * WiFi Pineapple Enterprise
   REMOTE COMMAND & CONTROL
   * Cloud C²
   
   
   
   HOTPLUG ATTACKS
   * USB Rubber Ducky
   * Bash Bunny
   * Shark Jack
   * Plunder Bug LAN Tap
   * GreatFET One
   
   
   
   IMPLANTS & REMOTE ACCESS
   * Key Croc
   * Packet Squirrel
   * Screen Crab
   * LAN Turtle
   * O.MG Cable
   
   
   
   FIELD KITS
   * Elite Series
   * Essential Series
   EDUCATIONAL KITS
   * O.MG DemonSeed EDU
   * Throwing Star LAN Tap
   
   
   
   MERCH
   * T-Shirts
   * Accessories
   * Stickers
 * Podcasts
 * Community
 * Support
 * Login

0

Your Cart is Empty

Continue Shopping

--------------------------------------------------------------------------------

 * $0.00 Subtotal
 * 

 * Login

Products Podcasts


Community Support

 * WIFI PENTESTING

 * WiFi Pineapple Mark VII
 * WiFi Pineapple Enterprise

 * REMOTE COMMAND & CONTROL

 * Cloud C²



 * HOTPLUG ATTACKS

 * USB Rubber Ducky
 * Bash Bunny
 * Shark Jack
 * Plunder Bug LAN Tap
 * GreatFET One



 * IMPLANTS & REMOTE ACCESS

 * Key Croc
 * Packet Squirrel
 * Screen Crab
 * LAN Turtle
 * O.MG Cable



 * FIELD KITS

 * Elite Series
 * Essential Series

 * EDUCATIONAL KITS

 * O.MG DemonSeed EDU
 * Throwing Star LAN Tap



 * MERCH

 * T-Shirts
 * Accessories
 * Stickers



Hak5 – The longest running YouTube show defines Technolust

ThreatWire – News on security, privacy, and internet freedom!

Metasploit Minute – The break down on breaking in with Mubix

HakTip – Essentials for new hackers, enthusiasts, and IT pros

TRUST YOUR TECHNOLUST

Since 2005 we've proclaimed our love for technology with this simple mantra –
and we invite you to share in our passion. Welcome!





 * WIFI PENTESTING

 * WiFi Pineapple Mark VII
 * WiFi Pineapple Enterprise

 * REMOTE COMMAND & CONTROL

 * Cloud C²



 * HOTPLUG ATTACKS

 * USB Rubber Ducky
 * Bash Bunny
 * Shark Jack
 * Plunder Bug LAN Tap
 * GreatFET One



 * IMPLANTS & REMOTE ACCESS

 * Key Croc
 * Packet Squirrel
 * Screen Crab
 * LAN Turtle
 * O.MG Cable



 * FIELD KITS

 * Elite Series
 * Essential Series

 * EDUCATIONAL KITS

 * O.MG DemonSeed EDU
 * Throwing Star LAN Tap



 * MERCH

 * T-Shirts
 * Accessories
 * Stickers



Hak5 – The longest running YouTube show defines Technolust

ThreatWire – News on security, privacy, and internet freedom!

Metasploit Minute – The break down on breaking in with Mubix

HakTip – Essentials for new hackers, enthusiasts, and IT pros

TRUST YOUR TECHNOLUST

Since 2005 we've proclaimed our love for technology with this simple mantra –
and we invite you to share in our passion. Welcome!





Hak5 – The longest running YouTube show defines Technolust

ThreatWire – News on security, privacy, and internet freedom!

Metasploit Minute – The break down on breaking in with Mubix

HakTip – Essentials for new hackers, enthusiasts, and IT pros

TRUST YOUR TECHNOLUST

Since 2005 we've proclaimed our love for technology with this simple mantra –
and we invite you to share in our passion. Welcome!



Access Denied
IMPORTANT! If you’re a store owner, please make sure you have Customer accounts
enabled in your Store Admin, as you have customer based locks set up with
EasyLockdown app. Enable Customer Accounts


SIGNATURE HAK5 GEAR



WiFi Pineapple

New

WIFI PINEAPPLE

The infamous rogue access point and WiFi pentest platform. Its simple web
interface hosts an app ecosystem. As seen on Silicon Valley.

from $14.99
USB Rubber Ducky



USB RUBBER DUCKY

A "flash drive" that types keystroke injection payloads into unsuspecting
computers at incredible speeds. As seen on Mr. Robot.

from $49.99
Bash Bunny

New

BASH BUNNY

A quad-core Linux-box-on-USB-stick mimicking multiple trusted devices to deploy
advanced pentest and IT automation payloads.

from $119.99

Key Croc

New

KEY CROC

A keylogger armed with pentest tools, remote access and payloads that trigger
multi-vector attacks when chosen keywords are typed.

from $99.99
Shark Jack

New

SHARK JACK

Jack into a network and instantly run advanced recon, exfiltration, attack and
automation payloads.

from $69.99
LAN Turtle



LAN TURTLE

A Remote Access Toolkit posing as an ordinary USB Ethernet adapter. Drop it on a
LAN for an instant backdoor shell. As seen on Mr. Robot.

$79.99

Packet Squirrel



PACKET SQUIRREL

A matchbook-sized linux box packing multiple network payloads - like packet
sniffing, VPN tunneling and man-in-the-middle attacks.

$79.99
Plunder Bug LAN Tap



PLUNDER BUG LAN TAP

A pocket-sized Smart LAN Tap with USB-C convenience for passive monitoring or
active engagements on wired networks.

$79.99
Screen Crab



SCREEN CRAB

A stealthy video man-in-the-middle that captures screenshots or videos to disk
and streams live to the Internet for remote viewing.

$199.99


NEW Hak5 MERCH! 👕🧢

Celebrate 16 years of Technolust with all new Hak5 Merch, including the limited
edition *.* collection!



Stickers • Hats • Tees • Hoodies



Shop All Merch
GET REWARDED

We know it takes a huge amount of time, energy and skill to make great payloads.
That's why we want to honor them, share them with the world and reward you with
up to $2,000 in Hak5 prizes. Enter now to get your payload in front of
thousands.

ENTER NOW

--------------------------------------------------------------------------------


MISCHIEF GADGETS



Exclusively at Hak5 — we've teamed up with MG to bring access to this previously
clandestine attack hardware.

SHOP MISCHIEF GADGETS

Malicious Cable Detector
by O.MG

The O.MG Cable
has arrived

O.MG Cable - Lightning to USB-C

New

O.MG CABLE - LIGHTNING TO USB-C

By Mischief Gadgets

from $24.99
O.MG Cable - C-to-C Directional

New

O.MG CABLE - C-TO-C DIRECTIONAL

By Mischief Gadgets

from $24.99
O.MG Cable - * to USB-A



O.MG CABLE - * TO USB-A

By Mischief Gadgets

from $19.99

Malicious Cable Detector by O.MG



MALICIOUS CABLE DETECTOR BY O.MG

By Mischief Gadgets

$39.99
O.MG DemonSeed EDU



O.MG DEMONSEED EDU

By Mischief Gadgets

from $19.99
O.MG DemonSeed Refill Kit



O.MG DEMONSEED REFILL KIT

By Mischief Gadgets

$19.99




CLOUD C²

Deploy Hak5 Gear and get on-site results from anywhere with a single web
dashboard


FEATURED MAKERS


Keysy



KEYSY

By TinyLabs

from $14.99
Ubertooth One



UBERTOOTH ONE

By Great Scott Gadgets

Sold Out
HackRF One with ANT500 Telescopic Antenna



HACKRF ONE WITH ANT500 TELESCOPIC ANTENNA

By Great Scott Gadgets

Sold Out
YARD Stick One with ANT500 Antenna



YARD STICK ONE WITH ANT500 ANTENNA

By Great Scott Gadgets

Sold Out
GreatFET One



GREATFET ONE

By Great Scott Gadgets

Sold Out

Throwing Star LAN Tap



THROWING STAR LAN TAP

By Great Scott Gadgets

Sold Out
Throwing Star LAN Tap Pro



THROWING STAR LAN TAP PRO

By Great Scott Gadgets

Sold Out
Acrylic Case for GreatFET One



ACRYLIC CASE FOR GREATFET ONE

By Great Scott Gadgets

Sold Out
Intervillage Badge



INTERVILLAGE BADGE

By Monero Devices

$142.00
HackRF One PCB



HACKRF ONE PCB

By Great Scott Gadgets

$219.99




LATEST PODCASTS


Unfortunately, an error occurred:
Hak5
• 730K Subscribers • 1.7K Videos • 57M Views
Latest episodes from Hak5 podcasts

 * Hak5



08:47

HakByte: Gather WiFi Reconnaissance on this $5 MicroController
8/19/2021
Hak5 -- Cyber Security Education, Inspiration, News & Community since 2005:

In this video, Alex Lynd demonstrates how you can use a $5 microcontroller to
get started with WiFi reconnaissance by utilizing monitor mode on the ESP8266.
This allows us to cheaply survey the wireless landscape around us, and determine
nearby WiFi activity with a simple Arduino sketch that also saves gathered
information on an SD card.

GitHub Repository: https://github.com/AlexLynd/ESPProLib-Demos
Ricardo Oliveira's ESP Pro Library: https://github.com/RicardoOliveira/ESPProLib

Alex's Website: http://alexlynd.com

Links to Hardware:
ESP8266 D1 Mini: https://amzn.to/3miu2Rw
D1 Mini SD Module: https://amzn.to/3gebzBO



Chapters:

00:00 Intro
00:18 What is the ESP8266?
00:41 What is Monitor Mode?
01:21 ESP Pro Library
03:55 Monitor Mode on the ESP8266
04:53 SD Logger Code
06:16 D1 Mini SD Card Logger
07:25 CSV Capture File
07:52 Outro

-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆
Our Site → https://www.hak5.org


Shop → http://hakshop.myshopify.com/
Subscribe → https://www.youtube.com/user/Hak5Darren?sub_confirmation=1
Support → https://www.patreon.com/threatwire
Contact Us → http://www.twitter.com/hak5
Threat Wire RSS → https://shannonmorse.podbean.com/feed/
Threat Wire iTunes →
https://itunes.apple.com/us/podcast/threat-wire/id1197048999
-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆

____________________________________________
Founded in 2005, Hak5's mission is to advance the InfoSec industry. We do this
through our award winning educational podcasts, leading pentest gear, and
inclusive community – where all hackers belong.
• 15K Views • 757 Likes • 52 Comments
09:34

The Biggest Cryptocurrency Hack Ever - Why Did It Happen? - ThreatWire
8/17/2021
Support ThreatWire! https://www.patreon.com/threatwire
Shop ThreatWire Merch Directly! - https://snubsie.com/shop

Hak5 -- Cyber Security Education, Inspiration, News & Community since 2005:
Is this the biggest crypto hack ever? Print Spooler is an actual Nightmare, and
a hacker claims t-mobile data was stolen in a server hack! All that coming up
now on ThreatWire.
#threatwire #hak5

Links:
Weekly security and privacy news, brought to you by Shannon Morse. ThreatWire is
a weekly news journalism show covering security and privacy topics for network
admins and users.

Watch this on youtube (video may be “private” until the scheduled publish time):
https://youtu.be/UW38I60EmX4

Shop ThreatWire Merch Directly! - https://snubsie.com/shop

Shop ThreatWire Merch on Teespring! - https://morsecode.creator-spring.com/

Support ThreatWire! https://www.patreon.com/threatwire

Links:
Read all the links via the RSS feed: https://shannonmorse.podbean.com/
Due to Youtube’s bots flagging my source links as “hacking”, you can now find
all future link databases via the RSS link (down below) and via the the
ThreatWire patreon page (each video post for each episode is a public post and
you do not have to be a member to view these).

-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆
Our Site → https://www.hak5.org
Shop → http://hakshop.myshopify.com/
Subscribe → https://www.youtube.com/user/Hak5Darren?sub_confirmation=1
Support → https://www.patreon.com/threatwire
Contact Us → http://www.twitter.com/hak5
Threat Wire RSS → https://shannonmorse.podbean.com/feed/
Threat Wire iTunes →
https://itunes.apple.com/us/podcast/threat-wire/id1197048999
-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆

____________________________________________
Founded in 2005, Hak5's mission is to advance the InfoSec industry. We do this
through our award winning educational podcasts, leading pentest gear, and
inclusive community – where all hackers belong.
• 18K Views • 1.1K Likes • 602 Comments
11:13

HakByte: Practice Hash Recovery Online with Google Colab
8/12/2021
In this episode, Alex Lynd demonstrates how beginners can learn about hash
recovery in the cloud using HashCat and Google Colab, a free machine learning
service. Note: Some commenters have pointed out this could cause your Google
account to be blocked, so please read the terms of service and avoid using any
important Google account for learning Hashcat.

GitHub Repository: https://github.com/AlexLynd/Colab-Tools

HashCat Hash Reference: https://hashcat.net/wiki/doku.php?id=example_hashes
Alex's Website: http://alexlynd.com

Chapters:
00:00 Intro
00:19 What is Google Colab?
00:44 Set Up Colab for Hash Recovery
02:01 Generate a Test Hashes to Crack
04:40 Jupyter Notebook Password Recovery Script Overview
08:09 Recovering Salted MD5 Hashes w/ HashCat
10:40 Outro

-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆
Our Site → https://www.hak5.org


Shop → http://hakshop.myshopify.com/
Subscribe → https://www.youtube.com/user/Hak5Darren?sub_confirmation=1
Support → https://www.patreon.com/threatwire
Contact Us → http://www.twitter.com/hak5
Threat Wire RSS → https://shannonmorse.podbean.com/feed/
Threat Wire iTunes →
https://itunes.apple.com/us/podcast/threat-wire/id1197048999
-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆

____________________________________________
Founded in 2005, Hak5's mission is to advance the InfoSec industry. We do this
through our award winning educational podcasts, leading pentest gear, and
inclusive community – where all hackers belong.
• 10K Views • 555 Likes • 107 Comments
18:02

Planning a Continuous Recon Platform | /dev/hack s01e01
8/11/2021
Join your hosts dade and Adam as they discuss the goals for the first season of
/dev/hack -- planning and building a continuous reconnaissance platform.

XKCD Comic: https://xkcd.com/1172/

Project Repository: https://github.com/natlas/natlas
Patreon: https://patreon.com/devslashhack
Hak5: https://hak5.org

dade: https://twitter.com/0xdade
adam: https://twitter.com/rubyonnails

If you have any questions, comments, concerns, ad hominem attacks, please feel
free to email us at devhack@hak5.org.

Hak5 -- Cyber Security Education, Inspiration, News & Community since 2005:

-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆
Our Site → https://www.hak5.org
Shop → http://hakshop.myshopify.com/
Subscribe → https://www.youtube.com/user/Hak5Darren?sub_confirmation=1
Support → https://www.patreon.com/threatwire
Contact Us → http://www.twitter.com/hak5
Threat Wire RSS → https://shannonmorse.podbean.com/feed/
Threat Wire iTunes →
https://itunes.apple.com/us/podcast/threat-wire/id1197048999
-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆

____________________________________________
Founded in 2005, Hak5's mission is to advance the InfoSec industry. We do this
through our award winning educational podcasts, leading pentest gear, and
inclusive community – where all hackers belong.
• 6.5K Views • 374 Likes • 23 Comments
13:17

Is Apple’s New CSAM Scanning Tech Privacy Invasive? - ThreatWire
8/10/2021
Stealing audio through LEDs, is Apple’s new CSAM scanning tech privacy invasive?
and Synology warns of botnet malware! All that coming up now on ThreatWire.
#threatwire #hak5

Links:
Weekly security and privacy news, brought to you by Shannon Morse. ThreatWire is
a weekly news journalism show covering security and privacy topics for network
admins and users.

Watch this on youtube (video may be “private” until the scheduled publish time):
https://youtu.be/75XYa3dKals

Shop ThreatWire Merch Directly! - https://snubsie.com/shop

Shop ThreatWire Merch on Teespring! - https://morsecode.creator-spring.com/

Support ThreatWire! https://www.patreon.com/threatwire

Links:
Read all the links via the RSS feed: https://shannonmorse.podbean.com/

Due to Youtube’s bots flagging my source links as “hacking”, you can now find
all future link databases via the RSS link (down below) and via the the
ThreatWire patreon page (each video post for each episode is a public post and
you do not have to be a member to view these).

-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆
Our Site → https://www.hak5.org
Shop → http://hakshop.myshopify.com/
Subscribe → https://www.youtube.com/user/Hak5Darren?sub_confirmation=1
Support → https://www.patreon.com/threatwire
Contact Us → http://www.twitter.com/hak5
Threat Wire RSS → https://shannonmorse.podbean.com/feed/
Threat Wire iTunes →
https://itunes.apple.com/us/podcast/threat-wire/id1197048999

Host: Shannon Morse → https://www.twitter.com/snubs
Host: Darren Kitchen → https://www.twitter.com/hak5darren
Host: Mubix → http://www.twitter.com/mubix
-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆
• 14K Views • 1K Likes • 123 Comments
06:04

Remote 3D Printing with Cura and Octorprint w/Glytch
8/9/2021
Glytch is back with another episode in the series on hacking a 3D Printer to
make better than before! Wireless 3d printing with Octoprint for Cura...this
time on Hak5!



Previous Octoprint Episode: https://www.youtube.com/watch?v=FHggrQDHCz8

Pineapple Badge 3D Model: https://www.thingiverse.com/thing:4613252/


Hardware:
Glytch's Favorite 3D Printer: https://amzn.to/3y8PU4E
Raspberry Pi 3B+: https://amzn.to/3x89bls
Raspberry Pi 4 (Recommended): https://amzn.to/3eUNvmM

As an Amazon Associate, Glytch earns from qualifying purchases through the links
above at no extra cost to you.

Social Media:
Glytch's Twitter: https://twitter.com/GlytchTech

Glytch's Instagram: https://instagram.com/GlytchTech
Glytch's Website: http://glytch.tech
Glytch's Youtube: https://youtube.com/glytch
• 4.5K Views • 218 Likes • 24 Comments
01:51:11

Chat with the OMG Dev Team
8/6/2021
The team behind the O.MG Cable is here to chat about their work. A look behind
the scenes over the last few years, what they are up to now, and open Q&A.
• 5.9K Views • 291 Likes • 9 Comments
04:06:00

Hak5 LIVE: 16th Anniversary Celebration
8/6/2021
Since August 5, 2005 we've been reminding you to Trust your Technolust. On this
sweet sixteen we invite you to join Hak5 hosts, developers & friends for a live
stream celebration!
• 5.8K Views • 462 Likes • 29 Comments
11:15

HakByte: Capture Wi-Fi Passwords From Smartphones with a Half-Handshake Attack
8/5/2021
In this episode, we show how hackers can abuse convenience features of Wi-Fi to
extract passwords from nearby smartphones belonging to Wi-Fi networks they've
connected to in the past.

-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆
Our Site → https://www.hak5.org
Shop → http://hakshop.myshopify.com/
Subscribe → https://www.youtube.com/user/Hak5Darren?sub_confirmation=1
Support → https://www.patreon.com/threatwire
Contact Us → http://www.twitter.com/hak5
Threat Wire RSS → https://shannonmorse.podbean.com/feed/
Threat Wire iTunes →
https://itunes.apple.com/us/podcast/threat-wire/id1197048999

Host: Shannon Morse → https://www.twitter.com/snubs
Host: Darren Kitchen → https://www.twitter.com/hak5darren
Host: Mubix → http://www.twitter.com/mubix
-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆
• 46K Views • 2.8K Likes • 217 Comments
08:53

Meteor Malware Disrupts Trains, PwnedPiper Targets Hospital Systems, DarkSide is
Back! - ThreatWire
8/3/2021
PwnedPiper Threatens Hospitals, Meteor Malware Causes a Train Disruption, and
BlackMatter is the new DarkSide! All that coming up now on ThreatWire.
#threatwire #hak5

Links:
Weekly security and privacy news, brought to you by Shannon Morse. ThreatWire is
a weekly news journalism show covering security and privacy topics for network
admins and users.

Watch this on youtube (video may be “private” until the scheduled publish time):
https://youtu.be/5ofYqjC1s40

Shop ThreatWire Merch Directly! - https://snubsie.com/shop

Shop ThreatWire Merch on Teespring! - https://morsecode.creator-spring.com/

Support ThreatWire! https://www.patreon.com/threatwire

Links:
Due to Youtube’s bots flagging my source links as “hacking”, you can now find
all future link databases via the RSS link (down below) and via the the
ThreatWire patreon page (each video post for each episode is a public post and
you do not have to be a member to view these).

-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆
Our Site → https://www.hak5.org
Shop → http://hakshop.myshopify.com/
Subscribe → https://www.youtube.com/user/Hak5Darren?sub_confirmation=1
Support → https://www.patreon.com/threatwire
Contact Us → http://www.twitter.com/hak5
Threat Wire RSS → https://shannonmorse.podbean.com/feed/
Threat Wire iTunes →
https://itunes.apple.com/us/podcast/threat-wire/id1197048999

Host: Shannon Morse → https://www.twitter.com/snubs
Host: Darren Kitchen → https://www.twitter.com/hak5darren
Host: Mubix → http://www.twitter.com/mubix
-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆
• 13K Views • 943 Likes • 40 Comments
16:04

Hacking a Wii Nunchuk for Big Robots w/Glytch
8/2/2021
Glytch is back with more hacked video game controllers. In particular, a nunchuk
is on the chopping block as they get their robot on...this time, on Hak5!


Resources: https://www.patreon.com/posts/hacking-wii-for-54406935


===Hardware===
Nunchuk: https://amzn.to/3llRvkm
Alternatively Generic Nunchuk - color code may differ, check wiring:
https://amzn.to/3ykZ0LM
Arduino Nano: https://amzn.to/3zZwQqd
NRF24L01: https://amzn.to/3lkK50z
Alternatively for more range - NRF24L01 w/ PA&LNA: https://amzn.to/2WAKBx2
AMS1117: https://amzn.to/3xcvhn2


As an Amazon Associate, Glytch earns from qualifying purchases through the links
above at no extra cost to you.

Social Media:
Glytch's Twitter: https://twitter.com/GlytchTech
Glytch's Patreon: https://www.patreon.com/glytchtech
Glytch's Instagram: https://instagram.com/GlytchTech
Glytch's Website: http://glytch.tech
Glytch's Youtube: https://youtube.com/glytch
• 6.6K Views • 377 Likes • 41 Comments
14:59

HakByte: How to use Postman to Reverse Engineer Private APIs
7/30/2021
In this episode we’ll show how to use Chrome or Firefox along with Postman to go
from a website using a private API all the way to Python code.

-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆
Our Site → https://www.hak5.org
Shop → http://hakshop.myshopify.com/
Subscribe → https://www.youtube.com/user/Hak5Darren?sub_confirmation=1
Support → https://www.patreon.com/threatwire
Contact Us → http://www.twitter.com/hak5
Threat Wire RSS → https://shannonmorse.podbean.com/feed/
Threat Wire iTunes →
https://itunes.apple.com/us/podcast/threat-wire/id1197048999

Host: Michael Raymond → https://www.twitter.com/the_hoid
-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆
• 16K Views • 901 Likes • 62 Comments
09:45

Pegasus Project Reveals Phone Spyware Targets - ThreatWire
7/27/2021
The REvil Decryption Key is Obtained, Windows & Linux are Vulnerable to
Privilege Escalation Attacks, and the Pegasus Project Reveals Phone Spyware
Targeting! All that coming up now on ThreatWire.
#threatwire #hak5

Links:
Weekly security and privacy news, brought to you by Shannon Morse. ThreatWire is
a weekly news journalism show covering security and privacy topics for network
admins and users.

Watch this on youtube: https://youtu.be/mJfCTJRs1io

Shop ThreatWire Merch Directly! - https://snubsie.com/shop

Shop ThreatWire Merch on Teespring! - https://morsecode.creator-spring.com/

Support ThreatWire! https://www.patreon.com/threatwire

Links:
Due to Youtube’s bots flagging my source links as “hacking”, you can now find
all future link databases via the RSS link (down below) and via the the
ThreatWire patreon page (each video post for each episode is a public post and
you do not have to be a member to view these).


Photo credit:
https://p1.pxfuel.com/preview/325/241/266/horse-with-wings-pegasus-myth-sunset.jpg


-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆
Our Site → https://www.hak5.org
Shop → http://hakshop.myshopify.com/
Subscribe → https://www.youtube.com/user/Hak5Darren?sub_confirmation=1
Support → https://www.patreon.com/threatwire
Contact Us → http://www.twitter.com/hak5
Threat Wire RSS → https://shannonmorse.podbean.com/feed/
Threat Wire iTunes →
https://itunes.apple.com/us/podcast/threat-wire/id1197048999

Host: Shannon Morse → https://www.twitter.com/snubs
Host: Darren Kitchen → https://www.twitter.com/hak5darren
Host: Mubix → http://www.twitter.com/mubix
-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆
• 23K Views • 1.6K Likes • 82 Comments
09:49

Wireless 3D Printing using OctoPrint w/Glytch
7/26/2021
Glytch is coming at you with a series on hacking a 3D Printer to make it even
betterer than before! Servers, wifi, and cameras oh my....and also something
about octopi? octopusses?...this time on Hak5!


Glytch's Favorite 3D Printer: https://amzn.to/3y8PU4E
Raspberry Pi 3B+: https://amzn.to/3x89bls
Raspberry Pi 4 (Recommended): https://amzn.to/3eUNvmM


As an Amazon Associate, Glytch earns from qualifying purchases through the links
above at no extra cost to you.

Social Media:
Glytch's Twitter: https://twitter.com/GlytchTech
Glytch's Instagram: https://instagram.com/GlytchTech
Glytch's Website: http://glytch.tech
Glytch's Youtube: https://youtube.com/glytch
• 6.4K Views • 368 Likes • 26 Comments
18:35

HakByte: Use Android Studio to Learn Android App Security Part 3
7/22/2021
In this episode, you are going to continue using our vulnerable android virtual
device to learn about android application hacking.


-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆
Our Site → https://www.hak5.org
Shop → http://hakshop.myshopify.com/
Subscribe → https://www.youtube.com/user/Hak5Darren?sub_confirmation=1
Support → https://www.patreon.com/threatwire
Contact Us → http://www.twitter.com/hak5
Threat Wire RSS → https://shannonmorse.podbean.com/feed/
Threat Wire iTunes →
https://itunes.apple.com/us/podcast/threat-wire/id1197048999

Host: Shannon Morse → https://www.twitter.com/snubs
Host: Darren Kitchen → https://www.twitter.com/hak5darren
Host: Mubix → http://www.twitter.com/mubix
-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆
• 5.9K Views • 268 Likes • 27 Comments
11:19

A Look at Glytch's Pocket Hardware Hacking Kit
7/19/2021
Glytch is back again, this time with a cursed video! You read that right, this
one has been a bit of a problem...But it's here, sit back, relax, and watch
Glytch ramble on about another mishmash of hardware in a fabric package, this
time on Hak5!


Gear links:
Hak5 Wrap: https://shop.hak5.org/products/hak5-essential-equipment-wrap
Tweezers: https://amzn.to/3kvRRUU
Side Cutters: https://amzn.to/3kxwpyI
Electric Screwdriver: https://amzn.to/3kAo8ds
Thick Lead Mechanical Pencil: https://amzn.to/3kEp6Fs
Solder Flux Pen: https://amzn.to/3ikTLVS
Solder: https://amzn.to/3xSr1Ko
TS80P Soldering Iron: https://amzn.to/3ezilRB



As an Amazon Associate, Glytch earns from qualifying purchases through the links
above at no extra cost to you.

Social Media:
Glytch's Twitter: https://twitter.com/GlytchTech
Glytch's Instagram: https://instagram.com/GlytchTech
Glytch's Website: http://glytch.tech
Glytch's Youtube: https://youtube.com/glytch
• 19K Views • 994 Likes • 81 Comments


12 


HAK5: EQUIPPING INFOSEC PROS

Founded in 2005, Hak5's mission is to advance the InfoSec industry. We do this
through our award winning podcasts, leading pentest gear, and inclusive
community – where all hackers belong.


WIFI PENTESTS

Reconnissance and interception
with the famous WiFi Pineapple

SHOP


WIFI PENTESTS


HOTPLUG ATTACKS

The most advanced attacks
in just seconds

SHOP


HOTPLUG ATTACKS


ON-SITE IMPLANTS

Stealthy Remote Access toolkits, Man-in-the-middle and Near Access Operations

SHOP


ON-SITE IMPLANTS


FIELD KITS

Arm your Red Team with field proven pentest gear

SHOP


FIELD KITS

Sign up for sales, new releases, payloads and more…




THANK YOU!

We'll send you great deals and more!

 

 * 
 * 
 * 
 * 
 * 

INFORMATION

 * About

 * Shop Policy

 * Privacy Policy

 * Terms of Service

EXPLORE

 * Guides

 * Sponsorship

 * Media Inquiry

 * Global Authorized Resellers

SERVICE

 * Contact

 * Track your Order

 * Invoice Lookup

 * Quotes & Tax-Exempt Orders

ABOUT

Founded in 2005, Hak5's mission is to advance the InfoSec industry. We do this
through our award winning podcasts, leading pentest gear, and inclusive
community – where all hackers belong.

 * 
 * 
 * 
 * 
 * 

--------------------------------------------------------------------------------

Pentest tools for authorized auditing/security analysis only where permitted.
Subject to local and international laws where applicable. Users solely
responsible for compliance.
Classification unrestricted: MMKT ECCN 5D992.c NLR CCATS # self-class* for BIS
license exception ENC favorable treatment countries (US 15 CFR Supplement No 3
to Part 740). HTSUS.
Hak5 LLC, 548 Market Street #39371, San Francisco, CA 94104
DUNS #: 06-841-3898
shop@hak5.org

Copyright Hak5 LLC




SIGN UP TODAY

Get the inside scoop on the latest releases, events, popular payloads and Hak5
Gear tips!


THANK YOU!

We'll send you great deals and more!

 







LOGIN

or


Login
Forgot Password
Create Account


CREATE ACCOUNT

or


Create
Already Have an Account? Login!


RESET YOUR PASSWORD

We will send you an email to reset your password.


We've sent you an email with a link to update your password.
Submit
Cancel
×
We Value Your Privacy
Settings
NextRoll, Inc. ("NextRoll") and our advertising partners use cookies and similar
technologies on this site and around the web to collect and use personal data
(e.g., your IP address). If you consent, the cookies, device identifiers, or
other information can be stored or accessed on your device for the purposes
described below. You can click "Allow All" or "Decline All" or click Settings
above to customize your consent.
NextRoll and our advertising partners process personal data to: ● Store and/or
access information on a device; ● Create a personalized content profile; ●
Select personalised content; ● Personalized ads, ad measurement and audience
insights; ● Product development. For some of the purposes above, our advertising
partners: ● Use precise geolocation data. Some of our partners rely on their
legitimate business interests to process personal data. View our advertising
partners to see the purposes they believe they have a legitimate interest for
and how you can object to such processing.
Your changes on this site will be applied across the internet on any digital
property you visit using NextRoll's technology. If you select Decline All, you
will still be able to view content on this site and you will still receive
advertising, but the advertising will not be tailored for you. You may change
your setting whenever you see
Decline All
Allow All