Keep in mind these are all commercial products, You can make your own free (or close to it if you buy the raw hardware) versions just as easily, no reason to go out and buy a pineapple if all you're trying to do is learn. Surprised so much of his kit is out of the box and not as custom, most people I know find the commercial products while great, usually have certain limitations.
In 1986, Congress passed the Computer Fraud and Abuse Act (CFAA), now codified under Title 18 U.S. Code § 1030. This law makes it a federal crime to gain unauthorized access to “protected” computers (otherwise known as “hacking”) with the intent to defraud or do damage.
@@robhill8894there are many things that are illegal that are still done. Most of the crime is committed by your very own government. So why not be a step or two ahead of them?
I've been following you guys off and on for many years. You have helped me and my company a lot, although I'm not near where I need to be in the smarts, I learn something new every time I watch your videos. Thank you so much.
Thank you so much for taking the time out to put up this kind of information. This was definitely needed. I have projects coming up so this is a plus to be marketable.
I've been watching since 2005 Darren and Wes raised my curiosity with Gentoo and compiling my own kernel From there I was off to the races with a beer in hand I am still going but without the beer Cheers brother
Kind of crazy how an employee can accidentally find a USB stick and innocently connect it to their work computer to check what it is. When I used to work at a bank that is why USB sticks are banned and all the computer USB ports does not work and is disabled. Now I have to lock down everything at home so the kids don't get their computers infected or hacked.
In 1986, Congress passed the Computer Fraud and Abuse Act (CFAA), now codified under Title 18 U.S. Code § 1030. This law makes it a federal crime to gain unauthorized access to “protected” computers (otherwise known as “hacking”) with the intent to defraud or do damage.
The way they're simplifying the research process excites me. reminds me of the collaborative AI agents being used by SmythOS to revolutionize corporate operations.
for a real world pentest, how useful is the pineapple anymore now that HTTPS is ubiquitous for pretty much any and all website traffic that 'matters'? what data is really gathered with the device that would be damaging, disruptive, or cause an audit failure for either businesses or resident/individuals?
Snooping on HTTP is only one of the myriad of attack vectors. Personally, I find captive portals to be highly effective at collecting credentials and other PII - especially with realistic looking phishing pages. Many operating systems don't even show the URL of the portal, so it only has to "look the part". Then there's DNS spoofing as part of a greater phishing campaign, DoS attacks, WPA handshake captures for password cracking -- especially when coupled with deauthentication attacks, denial of certain protocols (what do most folks do when the VPN "just won't connect"). Both pineapples can be used for enterprise-WPA evil twin attacks. The Enterprise makes a great platform for lateral movement within a network when coupled with C2. Of course testing access points/base stations for vulnerabilities & misconfigurations (e.g. WPS) is a must, and one place it shines where other tools fail to check is testing clients/stations for misconfigurations (e.g. PNL leakage / susceptibility to rogue access points in general). TLS and HSTS are great - but I wouldn't just blindly trust this best-effort protocol.
could you guys make an more in depth video of the pineapple? i'd sometimes think to myself I should get one? but then i'm thinking well hat can it do more the a flipper zero with the wifi devboard? would be nice to hear it from the experts themself
Hi Darren, this may sound strange but, any chance you can do a quick video on the correct way to Shutdown the Pineapple Mark VII please. Installed mine tonight and could not find anything in the online documentation on the shutdown process. I was running it off an external battery so I just Logged Out and pulled out the battery. Thanks
Literally the reason we use Crowdstrike, and have all Bluetooth and USB devices blocked according to the type of device that’s being used, it’s literally the best defensive security software suite that exists
So what happens when a USB device lies about what it is? - not sure what it is currently. But 15 years ago, almost every business used the same dell keyboard. I always considered it insecure and a bit strange.
kinda random question, can I do with this payload usb a/c sticks, just put a script on so it installs all necessary software and does wind. updates etc?
I have to second this. 100% agree with putting food on the table but I miss when you were teaching 10 year old me how to hack and crack for free at home in safe and legal ways
What about tracking? Most RUclipsrs don't even mention this topic. The footprints are the most important thing. What about self-deletion as soon as a USB device is removed from Hak5. E.g. a hidden device (long-term) on the projector. Is there a standard setting for this?
What devices should I look into to get .. I've been cyber stalked and electronicly and Harassed for two years by police informants in Chicago... How can I protect myself and my Fiance and family
What's the difference between wifi pineapple mark 7 and wifi pineapple enterprise? And what's the solution for that a homemade router with a "homemade" program?
Good morning, I was browsing through RUclips and I came across this video. After being hacked three different times, And I'm pretty sure it happened while or through Facebook. And it always on the 3rd of the month because that's the day that I received my Social Security Disability payment, wiping me out. Is there anything that I can do to prevent this?
In 1986, Congress passed the Computer Fraud and Abuse Act (CFAA), now codified under Title 18 U.S. Code § 1030. This law makes it a federal crime to gain unauthorized access to “protected” computers (otherwise known as “hacking”) with the intent to defraud or do damage.
Hi. I have tried many times to buy some products from website and all the time my orders was canceled. so, please help to buy your products... I have written many times messages to your support team but I have got only automatic messages which says I have different address and so on problems... so, please let me know how to get touch you in person by phone or something like that... I am planning to buy 26 pcs of different products but no success... wait for reply.
You can't have as much fun as you used to since a lot of the companies have caught on and things like rogue Ap are detected now by apple. Haven't t2sted it recently but I got a notice last time I checked it said Rogue AP warning
You can make pretty much all of these yourself and you’ll learn A TON doing it. I’m building a pineapple out of my dads old router that I found in the basement.
Friends a hacker and I suspect he ease drops on my text, phone calls and websites. What tools is he using? Never connected to his network or wifi while living with him
Cool stuff to get started and learn but I don't want to be a script kiddie for the rest of my career. I want to make my own stuff and do my own code. Obviously the cables are a different story but everything else can be made or done on my own. The question is, where do I start?
Keep in mind these are all commercial products, You can make your own free (or close to it if you buy the raw hardware) versions just as easily, no reason to go out and buy a pineapple if all you're trying to do is learn. Surprised so much of his kit is out of the box and not as custom, most people I know find the commercial products while great, usually have certain limitations.
In 1986, Congress passed the Computer Fraud and Abuse Act (CFAA), now codified under Title 18 U.S. Code § 1030.
This law makes it a federal crime to gain unauthorized access to “protected” computers (otherwise known as “hacking”) with the intent to defraud or do damage.
No everyone lives in the USA @@robhill8894
@@robhill8894and?
@robhill8894 it's a good thing criminals care about laws, tho😊
@@robhill8894there are many things that are illegal that are still done. Most of the crime is committed by your very own government. So why not be a step or two ahead of them?
From watching you guys live stream in 2005 at the old house with Matt, to what it is now is amazing
You guys got me interested, again, in computer science and offensive security.
Thanks for all you do!
what do you do?
I’d look into emissions security if u can’t detect covert comms using emissions then u mind as well not even try
"involuntary backup" is underrated af 😂
Very handy in case of a randomware attack ;)
@@0xKremwoosh
I've been following you guys off and on for many years. You have helped me and my company a lot, although I'm not near where I need to be in the smarts, I learn something new every time I watch your videos. Thank you so much.
Thank you so much for taking the time out to put up this kind of information. This was definitely needed. I have projects coming up so this is a plus to be marketable.
It's crazy how fast time goes by.
Seems like just yesterday I was watching hak5 on tech TV.
@@atheistmecca971 That's right I totally forgot about that!
I've been watching since 2005
Darren and Wes raised my curiosity with Gentoo and compiling my own kernel
From there I was off to the races with a beer in hand
I am still going but without the beer Cheers brother
Who shared this video, you are such a great man You are the best of the best .
You saved my life from hacker .
Thank you so much. 🙏🏼😊
So crazy to me. I remember watching the first Hak5 episode and following y'all religiously for years. Damn, we're old asf.
I remember a particular wifi at a Starbucks. Good times.
You can make ALL of these tools yourself and you’ll gain A TON of knowledge doing it.
Awesome update love everything, still have my 1st rubber ducky, I need to add a few new items to the Christmas list, Cheers mate 👍
Sometimes these kind of videos teach you more then an hour long lecture video.
I love this channel! 😈
Kind of crazy how an employee can accidentally find a USB stick and innocently connect it to their work computer to check what it is. When I used to work at a bank that is why USB sticks are banned and all the computer USB ports does not work and is disabled. Now I have to lock down everything at home so the kids don't get their computers infected or hacked.
Our very own Q from James Bond
As a lifelong 007 fan, I am quite honored to receive this comment. Thank you :)
This is what we needed 🎉Thank you ❤❤❤
In 1986, Congress passed the Computer Fraud and Abuse Act (CFAA), now codified under Title 18 U.S. Code § 1030.
This law makes it a federal crime to gain unauthorized access to “protected” computers (otherwise known as “hacking”) with the intent to defraud or do damage.
Maliciuos cables is something i never thought i hear
The way they're simplifying the research process excites me. reminds me of the collaborative AI agents being used by SmythOS to revolutionize corporate operations.
Darren is a mad dog; Love your business brother!
Is ther a more detailed video of the products shown here?
Bro sells problem and solution together, Malicious Cable and Detector 🤣🤣🤣
Yee I like that
If a want to stole info with a pendrive what do you suggest to buy? Thankz
for a real world pentest, how useful is the pineapple anymore now that HTTPS is ubiquitous for pretty much any and all website traffic that 'matters'? what data is really gathered with the device that would be damaging, disruptive, or cause an audit failure for either businesses or resident/individuals?
Snooping on HTTP is only one of the myriad of attack vectors. Personally, I find captive portals to be highly effective at collecting credentials and other PII - especially with realistic looking phishing pages. Many operating systems don't even show the URL of the portal, so it only has to "look the part". Then there's DNS spoofing as part of a greater phishing campaign, DoS attacks, WPA handshake captures for password cracking -- especially when coupled with deauthentication attacks, denial of certain protocols (what do most folks do when the VPN "just won't connect"). Both pineapples can be used for enterprise-WPA evil twin attacks. The Enterprise makes a great platform for lateral movement within a network when coupled with C2. Of course testing access points/base stations for vulnerabilities & misconfigurations (e.g. WPS) is a must, and one place it shines where other tools fail to check is testing clients/stations for misconfigurations (e.g. PNL leakage / susceptibility to rogue access points in general). TLS and HSTS are great - but I wouldn't just blindly trust this best-effort protocol.
I wish i could tell you, but im making profit now 😂
Fuck bro, you have been doing this for a long time. I remember listening to your podcast years and years ago. Respect.
could you guys make an more in depth video of the pineapple? i'd sometimes think to myself I should get one? but then i'm thinking well hat can it do more the a flipper zero with the wifi devboard? would be nice to hear it from the experts themself
Hi Darren, this may sound strange but, any chance you can do a quick video on the correct way to Shutdown the Pineapple Mark VII please. Installed mine tonight and could not find anything in the online documentation on the shutdown process. I was running it off an external battery so I just Logged Out and pulled out the battery.
Thanks
Great video
Just in time for Christmas
does those tools also works on phones?
do you deliver to nigeria?
When will the Coconut be back in stock?
Literally the reason we use Crowdstrike, and have all Bluetooth and USB devices blocked according to the type of device that’s being used, it’s literally the best defensive security software suite that exists
Yeah, there are other attacks like Thunderspy which won't be blocked by such software. Physical access is all it needs.
If you think Crowdstrike will protect you, you're a sucker.
So what happens when a USB device lies about what it is? - not sure what it is currently. But 15 years ago, almost every business used the same dell keyboard. I always considered it insecure and a bit strange.
@@pragmaticperson7127Their repetitive misuse of literally says it all.
@@goat-eyeslol. fax.(kidding)
nice change of pace ! :D
Keep up the good work 💪
Take our money 💰 we’ve come a lonnnnnnnng way from BackTrack
The most complicated thing, how safe is to buy those tools?
Is purchasing restricted to universities and government agencies only?
No it is not. You can buy everything yourself.
kinda random question, can I do with this payload usb a/c sticks, just put a script on so it installs all necessary software and does wind. updates etc?
Thank you. Fantastic stuff.
Are any skills needed to use omg cable? Is there a userfriendly software?
I want to buy a full Hak5 gear, how can I get it, I am in Cameroon
I need to do some shopping 😅 thanks for sharing
I love how these simple looking devices are so we'll described in how they can be weaponized by anyone tech savvy to intrude networks or systems.
Hak5 4Life
Wow 😎 nice tools
Great gear but I really miss when you used to do regular hacking videos.
I have to second this. 100% agree with putting food on the table but I miss when you were teaching 10 year old me how to hack and crack for free at home in safe and legal ways
Soon... 😉
Do u ship theese products in India it's demanding in india
4:20 Love the Hackers movie reference
How can I get in touch with you
As a student are these devices okay to test on my home systems?
Why wouldn't they be? Your property is your property. No one can tell you what to do or not to do with your property.
@@ethanrandall3005 Sorry, I should’ve said safe not okay.
or only on pc`s?
What about tracking? Most RUclipsrs don't even mention this topic. The footprints are the most important thing.
What about self-deletion as soon as a USB device is removed from Hak5. E.g. a hidden device (long-term) on the projector. Is there a standard setting for this?
Great stuff!
Why can't people purchase the Kismet Case Mod any longer?
Love it!
involuntary backup!! hahahaha. thats great dude!
What devices should I look into to get .. I've been cyber stalked and electronicly and Harassed for two years by police informants in Chicago...
How can I protect myself and my Fiance and family
What's the difference between wifi pineapple mark 7 and wifi pineapple enterprise? And what's the solution for that a homemade router with a "homemade" program?
It's Darren! We missed you!
Awesome gear
Dang Darren you just put up our Christmas wish-list.!
Good morning, I was browsing through RUclips and I came across this video. After being hacked three different times, And I'm pretty sure it happened while or through Facebook. And it always on the 3rd of the month because that's the day that I received my Social Security Disability payment, wiping me out. Is there anything that I can do to prevent this?
Good morning,
Most likely it's a relativ robbing you...
Change all your password a activate 2FA on Facebook
hi, and hmm suppose I want to monitor a cell phone. I know the # and the base location- where he lives. What is available to do that?
Bro your joking💀
Can u help me find the signal
Electricity can cook a man's dinner but it can also cook the man
Congratulation 🥳
i just ordered a usb rubber ducky cant wait to prank someone with it
Want to do a new tutorial "playlist" with wifi pineapple nano/mk7
Wild stuff
Hilarious delivery
will be more better if u list all the hack5 products and where to buy them
We miss Snubs, get her back Darryl
Damn those cables are scary. Imagine replacing a few dozen cables in loose packaging in a walmart or gas station.
Yeah, I'm never buying cheap charging cables again
Darren still hacking? Good stuff
Till the 🐄🐄🐄come home
can the packet squirrel exploit a printer?
I want all of theseeee 😫😫
just like me, getting greed y in buying all
do you plan any good discounts on all those?
In 1986, Congress passed the Computer Fraud and Abuse Act (CFAA), now codified under Title 18 U.S. Code § 1030.
This law makes it a federal crime to gain unauthorized access to “protected” computers (otherwise known as “hacking”) with the intent to defraud or do damage.
Hi. I have tried many times to buy some products from website and all the time my orders was canceled. so, please help to buy your products... I have written many times messages to your support team but I have got only automatic messages which says I have different address and so on problems... so, please let me know how to get touch you in person by phone or something like that... I am planning to buy 26 pcs of different products but no success... wait for reply.
Nice 🤝
You can't have as much fun as you used to since a lot of the companies have caught on and things like rogue Ap are detected now by apple. Haven't t2sted it recently but I got a notice last time I checked it said Rogue AP warning
You can make pretty much all of these yourself and you’ll learn A TON doing it. I’m building a pineapple out of my dads old router that I found in the basement.
Flip the switch , plug it in, when the light turns green.. its a hacked machine
Yooo😂
Wow. It redefines my view on cybersecurity.
this to me is like what sports cars are to others...
Friends a hacker and I suspect he ease drops on my text, phone calls and websites. What tools is he using? Never connected to his network or wifi while living with him
Cool stuff to get started and learn but I don't want to be a script kiddie for the rest of my career. I want to make my own stuff and do my own code. Obviously the cables are a different story but everything else can be made or done on my own. The question is, where do I start?
hw can i learn hacking
I need a malicious cable detector that also a rubber ducky
5:45 did anyone else notice?
Haha yes
Can i get them all as a gift for my birthday?
its expensive as hell brooooo
Im on a mission to own all Hak5 products
I wanted to buy these hacking devices but unfortunately I live in Brazil which is the worst place in the world, it will cost me a lot.
not available in India
Nice
@Hak5 I need this stickers 😍
Thanks
Bro, where is hackrfOne?
HackRF One is the best device, so where is it?
Hit the like button faster than you can say Worcestershire sauce.
My mouth is drooling. lol@involuntary backup.