@hak5
  @hak5
Hak5 | Stealth Payload Tips - Obfuscation & Lock key triggers - Hak5 @hak5 | Uploaded 10 months ago | Updated 3 hours ago
Enhancing our Canary payload for the USB Rubber Ducky and answers to your questions on SMB servers and lock key states.

0:00 - Intro
0:38 - Previous Payload Review
3:44 - Upgrades to our Payload
7:10 - Caps lock trigger as a function
9:26 - Obfuscation as a payload option
17:35 - Hiding the payload / only run once
18:52 - DEPLOY THE PAYLOAD
20:51 - Payload Q&A
22:30 - Lock Key Demo
24:37 - Setting up a SMB canary listener

Our Site → https://www.hak5.org
Subscribe → https://www.youtube.com/user/Hak5Darren?sub_confirmation=1

____________________________________________
Founded in 2005, Hak5's mission is to advance the InfoSec industry. We do this through our award winning educational podcasts, leading pentest gear, and inclusive community – where all hackers belong.
Stealth Payload Tips - Obfuscation & Lock key triggers - Hak5Writing Threatwire Live with @endingwithaliCovertly Implanting a USB Rubber Ducky into a MouseSignal Zero Day? - #threatwire #shorts #hak5 #informationsecurity #newsI-S00N China File Drop - ThreatWireIntroducing HIDX StealthLinkQuantum Cracks, Citrix & npm Risks - ThreatWireSlack AI is Reading Your Chats - ThreatWireEncryption Market Heating Up - ThreatWireMicrosoft Recall got Recalled - ThreatWirePAYLOAD: ICMP Data Exfiltration - USB Rubber Ducky/Exfiltration [PAYLOAD MINUTE]

Stealth Payload Tips - Obfuscation & Lock key triggers - Hak5 @hak5