Advanced Windows Recon Using the OMG Cable | HakByte

Поделиться
HTML-код
  • Опубликовано: 22 авг 2024
  • In today's episode, we exfiltrate reconnaissance data from a Windows machine to a Dropbox account using only the OMG cable. The data includes Wi-Fi network names and passwords, system hardware, services running, open ports, and more.
    Payload used: github.com/hak...
    Dropbox Apps: www.dropbox.co...
    -----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆
    Our Site → www.hak5.org
    Shop → hakshop.myshopi...
    Subscribe → www.youtube.co...
    Support → / threatwire
    Contact Us → / hak5
    -----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆
    ____________________________________________
    Founded in 2005, Hak5's mission is to advance the InfoSec industry. We do this through our award winning educational podcasts, leading pentest gear, and inclusive community - where all hackers belong.

Комментарии • 43

  • @IamJakoby
    @IamJakoby 2 года назад +22

    I really appreciate you for having me on. Hopefully others will be able to learn from this and make their own awesome payloads. 😀

    • @jmr
      @jmr 2 года назад +3

      Very nice work.

    • @IamJakoby
      @IamJakoby 2 года назад +1

      @@jmr thank you kind sir 🙏

    • @wrathofainz
      @wrathofainz 2 года назад +1

      Props to you for being smart _and_ stylish.
      My only note is on your delivery. You came across like a high school teacher reading from a book.
      On camera you appear to be staring at a script. Idk.
      That mic is fuckin' _sick_

    • @IamJakoby
      @IamJakoby 2 года назад +3

      @@wrathofainz i really appreciate the feedback. Honest and constructive. I was reading from a script right below my camera. I low key have bad anxiety sometimes and it definitely came through in this video. The more I do something the more comfortable I get and intend to improve in that area. I'm feeling a little more confident now

    • @wrathofainz
      @wrathofainz 2 года назад +1

      @@IamJakoby _This is the way_ 😂 I'm sure you'll do fine. Good luck!
      Random music drop:
      - The Hand That Feeds - Nine Inch Nails
      -The Difference Between Medicine And Poison Is In The Dose - Circa Survive
      - Durin's Tower - Of The Trees
      Zamal - Ganja White Night
      Have a nice day, comment readers.

  • @adrianmsantangelo
    @adrianmsantangelo 2 года назад +4

    Jakoby is friggin awesome. Good content, helpful person, and easy to follow. Really hope to see more of his stuff here!

  • @PanicAcid
    @PanicAcid 2 года назад +3

    Great video, Jakoby has contributed some fantastic things to the community thus so far and doesn't seem to be slowing down!

    • @IamJakoby
      @IamJakoby 2 года назад +1

      I really really appreciate you panic! ❤️

  • @myggen8173
    @myggen8173 2 года назад +3

    Good work man! This guy got some very helpful ducky payloads and have helped me with a project:) Keep it up!

    • @IamJakoby
      @IamJakoby 2 года назад +1

      I really appreciate you showing support man 🙏

  • @juliusrowe9374
    @juliusrowe9374 2 года назад +3

    Great tutorial and content! Please keep them coming!

  • @jteds711
    @jteds711 2 года назад +1

    I see you with the 5900x my guy. Nice, great tutorial. Thank you

  • @jimlahey5354
    @jimlahey5354 2 года назад +1

    That matrix background 😂

  • @jmr
    @jmr 2 года назад +2

    Great tutorial and very nice code.

  • @oneshottricks
    @oneshottricks 2 года назад +1

    thank you for this video 🙏🏽

  • @LUDOVICOPAPALIA
    @LUDOVICOPAPALIA 2 года назад +2

    What about using a omg usb or a rubberducky to crete a visual access (remote desktop) to the system. Cause sometimes having access to the data isn't enough...

  • @andretarvok7122
    @andretarvok7122 2 года назад +2

    pretty cool script but no lazagne for passwords? no mimikatz? only gives list of files? my azorult does all that and also searches for juicy files on the disk with interesting file names and uploads them via ftp. good script but dropping any good bot onto a windows machine would also do all of this maybe minus the geo location.

    • @IamJakoby
      @IamJakoby 2 года назад +2

      Hmm my comment didn't post yesterday.
      So yea I have other payloads that utilize those but this particular one was basically just to show the capabilities of powershell alone. Introduce a bunch of functions people could grab and use in their own payloads.
      I did almost add the function to grab files with juicy names or contents but decided it would be outside the scope of the target audience for this one. That again being novices.
      However if you like you can go to my github and submit a pull request to add to the payload. I'll add a shout out to the Readme to give you credit and mention you in future videos showing updated versions
      Appreciate your feedback

  • @GoToTheGymPlz
    @GoToTheGymPlz Год назад +1

    only here cuz I found Jakoby first

  • @sargismartirosyan9946
    @sargismartirosyan9946 2 года назад +1

    you are the best

  • @ramosel
    @ramosel 2 года назад +1

    Where's Darren?? Hope he's OK.

    • @IamJakoby
      @IamJakoby 2 года назад +1

      i assure you he is doing well and is hard at work and just distracted currently :]

    • @ramosel
      @ramosel 2 года назад +1

      @@IamJakoby Thank you.

  • @cod4volume
    @cod4volume 2 года назад +1

    I heard y’all were giving away 1000 for free at defcon this year

    • @IamJakoby
      @IamJakoby 2 года назад +1

      are you going to be at defcon?

    • @cod4volume
      @cod4volume 2 года назад

      @@IamJakoby perhaps :) but will it be virtual or in person, who knows… heck yeah I’m going!

    • @IamJakoby
      @IamJakoby 2 года назад +2

      @@cod4volume ill be there as well, if you see me come say whats up

  • @pyro_freak
    @pyro_freak 2 года назад

    where is darren kitchen

  • @remigiuszbloch
    @remigiuszbloch 2 года назад +1

    Yeah... maybe if you lucky. Problem with all those cables/badusb tools is when you try to plug them into updated Win10 machine, even basic antivirus will block them from execution. Those kind of presentations on Hak5 channel are good for selling tools that work in theory.
    If you need to target one specific machine and it's updated and used by even semi-competent user, you are out of luck. You need to look for another attack vector, like some dum Suzy from accounting.

    • @IamJakoby
      @IamJakoby 2 года назад +5

      that is actually not exactly true.
      especially if you are just doing a keystroke injection attack
      it just thinks it is a keyboard unless the have some kind of device id filtering it wont stop it
      granted i am using IWR with this payload and yea upper corporate companies will have that disabled but i will tell you it is absolutely terrifying how many every day companies absolutely do not have the defenses in place that they should.
      and also without a doubt social engineering will almost always reign supreme

  • @tacinsoulweed3419
    @tacinsoulweed3419 2 года назад +1

    First

  • @scammersexploited
    @scammersexploited 2 года назад +1

    Useless

    • @IamJakoby
      @IamJakoby 2 года назад

      What would make it not useless? Always open to suggestions

    • @Msantor1605
      @Msantor1605 2 года назад +2

      He was just describing his post, that's all.