Hak5On this episode of HakByte, @AlexLynd demonstrates how to use the PineAP module on the WiFi Pineapple to run a KARMA WiFi Attack. This allows an attacker to trick your WiFi device into connecting to a malicious access point, by spoofing networks its connected to before. -----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆ Buy a WiFi Pineapple: shop.hak5.org WiFi Pineapple Docs: docs.hak5.org/wifi-pineapple Capturing Half Handshakes: youtube.com/watch?v=5guDKTc6Hak Alex Lynd's Twitter: twitter.com/AlexLynd Alex Lynd's website: http://alexlynd.com -----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆ Chapters: Intro @AlexLynd 00:00 What is the WiFi Pineapple? 00:17 What are KARMA Attacks? 00:39 What You'll Need 00:58 Connecting your Pineapple 01:18 PineAP Interface 02:01 How PineAP Works 03:12 Using the Scanners 03:51 KARMA Attack Requirements 06:45 Broadcasting Open Networks 07:14 Setting up Filters 08:44 Deauthing our Victim 09:37 KARMA Attack Demo 10:18 MITM & WiFi Radios 10:53 Attack Implications 11:45 Mitigating KARMA 12:14 Outro 12:38
____________________________________________ Founded in 2005, Hak5's mission is to advance the InfoSec industry. We do this through our award winning educational podcasts, leading pentest gear, and inclusive community – where all hackers belong.
Create Rogue Networks on the WiFi Pineapple (PineAP KARMA Attacks)Hak52022-05-05 | On this episode of HakByte, @AlexLynd demonstrates how to use the PineAP module on the WiFi Pineapple to run a KARMA WiFi Attack. This allows an attacker to trick your WiFi device into connecting to a malicious access point, by spoofing networks its connected to before. -----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆ Buy a WiFi Pineapple: shop.hak5.org WiFi Pineapple Docs: docs.hak5.org/wifi-pineapple Capturing Half Handshakes: youtube.com/watch?v=5guDKTc6Hak Alex Lynd's Twitter: twitter.com/AlexLynd Alex Lynd's website: http://alexlynd.com -----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆ Chapters: Intro @AlexLynd 00:00 What is the WiFi Pineapple? 00:17 What are KARMA Attacks? 00:39 What You'll Need 00:58 Connecting your Pineapple 01:18 PineAP Interface 02:01 How PineAP Works 03:12 Using the Scanners 03:51 KARMA Attack Requirements 06:45 Broadcasting Open Networks 07:14 Setting up Filters 08:44 Deauthing our Victim 09:37 KARMA Attack Demo 10:18 MITM & WiFi Radios 10:53 Attack Implications 11:45 Mitigating KARMA 12:14 Outro 12:38
____________________________________________ Founded in 2005, Hak5's mission is to advance the InfoSec industry. We do this through our award winning educational podcasts, leading pentest gear, and inclusive community – where all hackers belong.Ransomware Leader Arrested - ThreatWireHak52024-06-19 | ⬇️ OPEN FOR LINKS TO ARTICLES TO LEARN MORE ⬇️
Want to work with Ali? endingwithalicollabs@gmail.com
[❗] Join the Patreon→ patreon.com/threatwire 0:00 0 - Intro 00:12 1 - Two Final Updates 02:26 2 - 💻📄➡️👾👹 04:24 3 - Scattered Spider Is Scattered No More 05:18 4 - Outro
Founded in 2005, Hak5's mission is to advance the InfoSec industry. We do this through our award winning educational podcasts, leading pentest gear, and inclusive community – where all hackers belong.Microsoft Recall got Recalled - ThreatWireHak52024-06-12 | ⬇️ OPEN FOR LINKS TO ARTICLES TO LEARN MORE ⬇️
Founded in 2005, Hak5's mission is to advance the InfoSec industry. We do this through our award winning educational podcasts, leading pentest gear, and inclusive community – where all hackers belong.Microsoft Recall is a Bad Idea - ThreatWireHak52024-06-05 | ⬇️ OPEN FOR LINKS TO ARTICLES TO LEARN MORE ⬇️
Want to work with Ali? endingwithalicollabs@gmail.com
[❗] Join the Patreon→ patreon.com/threatwire 0:00 0 - Intro 00:11 1 - What is Happening with Ticketmaster 01:19 2 - Security Breakdown Of Microsoft AI 04:21 3 - Bricked Routers Source Discovered 05:53 4 - Outro
Founded in 2005, Hak5's mission is to advance the InfoSec industry. We do this through our award winning educational podcasts, leading pentest gear, and inclusive community – where all hackers belong.Apple’s Accidental Stalkerware - ThreatWireHak52024-05-29 | ⬇️ OPEN FOR LINKS TO ARTICLES TO LEARN MORE ⬇️
Founded in 2005, Hak5's mission is to advance the InfoSec industry. We do this through our award winning educational podcasts, leading pentest gear, and inclusive community – where all hackers belong.Slack AI is Reading Your Chats - ThreatWireHak52024-05-22 | ⬇️ OPEN FOR LINKS TO ARTICLES TO LEARN MORE ⬇️
Want to work with Ali? endingwithalicollabs@gmail.com
[❗] Join the Patreon→ patreon.com/threatwire 00:00 Intro 00:09 Fluent Bit Memory Corruption Catastrophe 01:22 Slack Training AI Using User Data 02:42 Cybersecurity Fear Mongering on Twitter 04:37 Outro
🔗 Story 3: Cybersecurity Fear Mongering on Twitter https://x.com/alifcoder/status/1792108250248380451 https://x.com/Parul_Gautam7/status/1791836699888079127
Founded in 2005, Hak5's mission is to advance the InfoSec industry. We do this through our award winning educational podcasts, leading pentest gear, and inclusive community – where all hackers belong.Is Elon Musk a Security Expert? - ThreatWireHak52024-05-15 | ⬇️ OPEN FOR LINKS TO ARTICLES TO LEARN MORE ⬇️
Founded in 2005, Hak5's mission is to advance the InfoSec industry. We do this through our award winning educational podcasts, leading pentest gear, and inclusive community – where all hackers belong.Malicious Cable Detector by O.MGHak52024-05-10 | Get O.MG gear:
Music by KANGA (kanga.bandcamp.com) ____________________________________________ Founded in 2005, Hak5's mission is to advance the InfoSec industry. We do this through our award winning educational podcasts, leading pentest gear, and inclusive community – where all hackers belong.LockBitSupp Revealed? - ThreatWireHak52024-05-08 | ⬇️ OPEN FOR LINKS TO ARTICLES TO LEARN MORE ⬇️
Founded in 2005, Hak5's mission is to advance the InfoSec industry. We do this through our award winning educational podcasts, leading pentest gear, and inclusive community – where all hackers belong.AntiVirus is a Virus - ThreatWireHak52024-05-01 | ⬇️ OPEN FOR LINKS TO ARTICLES TO LEARN MORE ⬇️
Founded in 2005, Hak5's mission is to advance the InfoSec industry. We do this through our award winning educational podcasts, leading pentest gear, and inclusive community – where all hackers belong.New PuTTY Vulnerability - ThreatWireHak52024-04-22 | ⬇️ OPEN FOR LINKS TO ARTICLES TO LEARN MORE ⬇️
Founded in 2005, Hak5's mission is to advance the InfoSec industry. We do this through our award winning educational podcasts, leading pentest gear, and inclusive community – where all hackers belong.Writing Threatwire Live with @endingwithaliHak52024-04-16 | Surprise live stream - working on writing Threatwire live. Come Join!
____________________________________________ Founded in 2005, Hak5's mission is to advance the InfoSec industry. We do this through our award winning educational podcasts, leading pentest gear, and inclusive community – where all hackers belong.New OMG Cable - Woven & UnmarkedHak52024-04-15 | Now Available: hak5.org/omg
____________________________________________ Founded in 2005, Hak5's mission is to advance the InfoSec industry. We do this through our award winning educational podcasts, leading pentest gear, and inclusive community – where all hackers belong.A New Kind of Phishing Attack - ThreatWireHak52024-04-12 | ⬇️ OPEN FOR LINKS TO ARTICLES TO LEARN MORE ⬇️
If you want to help Ali with her research project email her at endingwithaliresearch@gmail.com → Please include (1️⃣) the size of your company and (2️⃣) what your company does.
[❗] Join the book club on Patreon→ patreon.com/threatwire 0:00 Intro 0:08 - New Kind of Phishing Attack 1:01 - Latrodectus 3:24 - Discord DOS 3:53 - Unsupported NAS devices left Vulnerable 6:03 - OUTRO
Founded in 2005, Hak5's mission is to advance the InfoSec industry. We do this through our award winning educational podcasts, leading pentest gear, and inclusive community – where all hackers belong.OWASP Oopsies and Calling XZ What It Is - ThreatWireHak52024-04-06 | ⬇️ OPEN FOR LINKS TO ARTICLES TO LEARN MORE ⬇️
0:00 Intro 0:11 - Backdoor in XZ-Utils 4:46 - OWASP Oopsies 5:30 - UPDATE: NVD has broken its silence 8:14 - UPDATE: AT&T Finally Admits The L 8:57 - OUTRO
Founded in 2005, Hak5's mission is to advance the InfoSec industry. We do this through our award winning educational podcasts, leading pentest gear, and inclusive community – where all hackers belong.Introducing the new Threat WireHak52024-04-01 | Order today at https://Hak5.org
____________________________________________ Founded in 2005, Hak5's mission is to advance the InfoSec industry. We do this through our award winning educational podcasts, leading pentest gear, and inclusive community – where all hackers belong.Apple’s Unfixable Vulnerability - ThreatWireHak52024-03-29 | ⬇️ OPEN FOR LINKS TO ARTICLES TO LEARN MORE ⬇️
Founded in 2005, Hak5's mission is to advance the InfoSec industry. We do this through our award winning educational podcasts, leading pentest gear, and inclusive community – where all hackers belong.CVEs ARE DYING - ThreatWireHak52024-03-22 | ⬇️ OPEN FOR LINKS TO ARTICLES TO LEARN MORE ⬇️
[❗] ThreatWire Patreon has moved to → patreon.com/threatwire 0:00 Intro 0:12 - The NVD is MIA 2:09 - Linux Foundation CVE Reporting Changed 4:16 - Cisco Acquires Splunk 4:20 - It’s Literally Black Market Extortion 6:06 - Is the AT&T Leak Real? 7:02 - OUTRO
Founded in 2005, Hak5's mission is to advance the InfoSec industry. We do this through our award winning educational podcasts, leading pentest gear, and inclusive community – where all hackers belong.Encryption Market Heating Up - ThreatWireHak52024-03-15 | ⬇️ OPEN FOR LINKS TO ARTICLES TO LEARN MORE ⬇️
[❗] ThreatWire Patreon has moved to → patreon.com/threatwire 0:00 Intro 0:10 - Encryption market is heating up 2:07 - Toddler Aged Malware Found 3:11 - Admitting to human error 4:08 - Outro
Founded in 2005, Hak5's mission is to advance the InfoSec industry. We do this through our award winning educational podcasts, leading pentest gear, and inclusive community – where all hackers belong.White House said to use Rust - ThreatWireHak52024-02-28 | ⬇️ OPEN FOR LINKS TO ARTICLES TO LEARN MORE ⬇️
Founded in 2005, Hak5's mission is to advance the InfoSec industry. We do this through our award winning educational podcasts, leading pentest gear, and inclusive community – where all hackers belong.I-S00N China File Drop - ThreatWireHak52024-02-22 | ⬇️ OPEN FOR LINKS TO ARTICLES TO LEARN MORE ⬇️
0:00 Intro 0:11 - What is happening with LockBit? 0:48 - Linux Kernel Added as CNA 1:02 - I-S00N China file drop 2:12 - Using Audio to Generate Fingerprint Attacks 4:02 - ChatGPT Accounts Linked to APTs Deleted 5:51 - Outro
Founded in 2005, Hak5's mission is to advance the InfoSec industry. We do this through our award winning educational podcasts, leading pentest gear, and inclusive community – where all hackers belong.Writing Threatwire Live with @endingwithaliHak52024-02-20 | Surprise live stream - working on writing Threatwire live. Come Join!
____________________________________________ Founded in 2005, Hak5's mission is to advance the InfoSec industry. We do this through our award winning educational podcasts, leading pentest gear, and inclusive community – where all hackers belong.DEF CON was actually cancelled?! - ThreatWireHak52024-02-15 | ⬇️ OPEN FOR LINKS TO ARTICLES TO LEARN MORE ⬇️
0:00 Intro 0:12 - Is this app speedrunning getting hacked? 2:07 - Can your Toothbrush be used DDOS someone? 2:20 - FCC finalizes data breach regulations for telecom companies 3:11 - DEFCON was actually canceled? 4:50 - OUTRO
Founded in 2005, Hak5's mission is to advance the InfoSec industry. We do this through our award winning educational podcasts, leading pentest gear, and inclusive community – where all hackers belong.China is able to trace your Airdrops - ThreatWireHak52024-01-24 | ⬇️ OPEN FOR LINKS TO ARTICLES TO LEARN MORE ⬇️
If you want to help Ali with her research project email her at endingwithaliresearch@gmail.com → Please include (1️⃣) the size of your company (2️⃣) what your role title is and (3️⃣) a little summary of what your job entails.
00:00 Intro 0:12 - SEC Twitter (x) Hacked! 1:52 - IT kind of does their job and gets in trouble 3:16 - China is able to trace your Airdrops 4:09 - Outro
Founded in 2005, Hak5's mission is to advance the InfoSec industry. We do this through our award winning educational podcasts, leading pentest gear, and inclusive community – where all hackers belong.Cyber Kidnapping & Cartas Controversial Cap Table Tactics Exposed! - ThreatWireHak52024-01-10 | ⬇️ OPEN FOR LINKS TO ARTICLES TO LEARN MORE ⬇️
If you want to help Ali with her research project email her at endingwithaliresearch@gmail.com → Please include (1️⃣) the size of your company (2️⃣) what your role title is and (3️⃣) a little summary of what your job entails.
Founded in 2005, Hak5's mission is to advance the InfoSec industry. We do this through our award winning educational podcasts, leading pentest gear, and inclusive community – where all hackers belong.Jack into a network with the Shark JackHak52024-01-10 | #hak5 #cybersecurity #shortsThe king of keystroke injectionHak52024-01-09 | #hak5 #cybersecurity #shortsThe Legendary WiFi PineappleHak52024-01-04 | #hak5 #cybersecurity #shortsInsane iPhone Exploit & Zombie Cookies Hijack Google Accounts - ThreatWireHak52024-01-03 | ⬇️ OPEN FOR LINKS TO ARTICLES TO LEARN MORE ⬇️
If you want to help Ali with her research project email her at endingwithaliresearch@gmail.com → Please include (1️⃣) the size of your company (2️⃣) what your role title is and (3️⃣) a little summary of what your job entails.
Founded in 2005, Hak5's mission is to advance the InfoSec industry. We do this through our award winning educational podcasts, leading pentest gear, and inclusive community – where all hackers belong.GTA Hacker Sentenced - ThreatWireHak52023-12-27 | ⬇️ OPEN FOR LINKS TO ARTICLES TO LEARN MORE ⬇️
If you want to help Ali with her research project email her at endingwithaliresearch@gmail.com → Please include (1️⃣) the size of your company (2️⃣) what your role title is and (3️⃣) a little summary of what your job entails.
00:00 Intro 0 - PSA: SEC Regulations Are Live 1 - GTA Hacker Sentenced 2 - An Update to the MongoDB story 3 - What is happening with AlphV? 4 - Major Vulnerability Found in SSH 5 - Outro
Founded in 2005, Hak5's mission is to advance the InfoSec industry. We do this through our award winning educational podcasts, leading pentest gear, and inclusive community – where all hackers belong.Twitter/X Bug Bounty Blunder - ThreatWireHak52023-12-21 | ⬇️ OPEN FOR LINKS TO ARTICLES TO LEARN MORE ⬇️
If you want to help Ali with her research project email her at endingwithaliresearch@gmail.com → Please include (1️⃣) the size of your company (2️⃣) what your role title and (3️⃣) a little summary of what your job entails.
0:00 - Intro 0:15 - Twitter Bug Bounty Program Flop 2:11 - 16 Year Reverse Engineers the iMessage Protocol 3:46 - Still Developing: MongoDB Breach 4:59 - Ledger Supply Chain Attack and A Research Project 6:00 - Outro
Founded in 2005, Hak5's mission is to advance the InfoSec industry. We do this through our award winning educational podcasts, leading pentest gear, and inclusive community – where all hackers belong.PAYLOAD: DuckyLogger 2.0 - Keylogger for USB Rubber Ducky [PAYLOAD MINUTE]Hak52023-12-19 | Exploring the DuckyLogger 2.0 keylogger payload by drapl0n for the USB Rubber Ducky, this time on [PAYLOAD MINUTE]
Payloads → payloads.hak5.org ____________________________________________ Hak5: Cyber Security Education, Inspiration & Community since 2005. ____________________________________________ Shop → shop.hak5.org Subscribe → youtube.com/user/Hak5Darren?sub_confirmation=1 ____________________________________________ Founded in 2005, Hak5's mission is to advance the InfoSec industry. We do this through our award winning educational podcasts, leading pentest gear, and inclusive community – where all hackers belong.PAYLOAD: ICMP Data Exfiltration - USB Rubber Ducky/Exfiltration [PAYLOAD MINUTE]Hak52023-12-14 | Delving into the ICMP Data Exfiltration payload by TW-D for the USB Rubber Ducky, this time on [PAYLOAD MINUTE]
Payloads → payloads.hak5.org ____________________________________________ Hak5: Cyber Security Education, Inspiration & Community since 2005. ____________________________________________ Shop → hakshop.myshopify.com Subscribe → youtube.com/user/Hak5Darren?sub_confirmation=1 ____________________________________________ Founded in 2005, Hak5's mission is to advance the InfoSec industry. We do this through our award winning educational podcasts, leading pentest gear, and inclusive community – where all hackers belong.Hax 4 BIOS, WordPress & Counter-Strike, oh my! - ThreatWireHak52023-12-13 | Support ThreatWire → patreon.com/threatwire @endingwithali Twitch → twitch.tv/endingwithali
0:00 - Intro 0:27 - Windows Fingerprint Sensors are Spoofable 1:41 - Okta oopsie turns into a big mess 2:59 - Citrix Netscaler causing issues across the board 4:00 - Outro
____________________________________________ Founded in 2005, Hak5's mission is to advance the InfoSec industry. We do this through our award winning educational podcasts, leading pentest gear, and inclusive community – where all hackers belong.Meet Ali Diamond - Hak5s new ThreatWire hostHak52023-12-01 | Meet Ali Diamond - @endingwithali - our new ThreatWire host! LIVE Q&A / Meet & Greet
____________________________________________
Founded in 2005, Hak5's mission is to advance the InfoSec industry. We do this through our award winning educational podcasts, leading pentest gear, and inclusive community – where all hackers belong.A New USB Worm On The Loose - ThreatWireHak52023-11-29 | Support ThreatWire → patreon.com/threatwire @endingwithali Twitch → twitch.tv/endingwithali
____________________________________________ Founded in 2005, Hak5's mission is to advance the InfoSec industry. We do this through our award winning educational podcasts, leading pentest gear, and inclusive community – where all hackers belong.Hackers Reported Themselves to the SEC? - ThreatWireHak52023-11-24 | Hackers Reported Themselves to the SEC, New Intel CPU CVE Discovered By Google, and a Promising Android iMessage Solution Turns out to Be Security Nightmare. All that and more, this time on ThreatWire!
____________________________________________ Founded in 2005, Hak5's mission is to advance the InfoSec industry. We do this through our award winning educational podcasts, leading pentest gear, and inclusive community – where all hackers belong.17 Hacker Tools in 7 Minutes - ALL Hak5 GearHak52023-11-22 | Find all the Hak5 pentest gear, videos, payloads & an awesome community at hak5.org
____________________________________________ Founded in 2005, Hak5's mission is to advance the InfoSec industry. We do this through our award winning educational podcasts, leading pentest gear, and inclusive community – where all hackers belong.Python risks system takeover & Lockbit prompts USB trades - ThreatWireHak52023-11-16 | Python obfuscation tools putting developers at risk for a total system take over. Lockbit Ransomware leads to USB drive being use to carry out bank trades. All that and more, this time on ThreatWire.
____________________________________________ Founded in 2005, Hak5's mission is to advance the InfoSec industry. We do this through our award winning educational podcasts, leading pentest gear, and inclusive community – where all hackers belong.Stealth Payload Tips - Obfuscation & Lock key triggers - Hak5Hak52023-11-08 | Enhancing our Canary payload for the USB Rubber Ducky and answers to your questions on SMB servers and lock key states.
0:00 - Intro 0:38 - Previous Payload Review 3:44 - Upgrades to our Payload 7:10 - Caps lock trigger as a function 9:26 - Obfuscation as a payload option 17:35 - Hiding the payload / only run once 18:52 - DEPLOY THE PAYLOAD 20:51 - Payload Q&A 22:30 - Lock Key Demo 24:37 - Setting up a SMB canary listener
____________________________________________ Founded in 2005, Hak5's mission is to advance the InfoSec industry. We do this through our award winning educational podcasts, leading pentest gear, and inclusive community – where all hackers belong.DaaS Bypasses Android Security, and Farewell Shannon - ThreatWireHak52023-11-07 | Support ThreatWire → patreon.com/threatwire
A new dropper as a service bypasses android security, Okta has another breach, and yes, this is Shannon's last episode. All that coming up now on ThreatWire.
#threatwire #hak5 ____________________________________________ Founded in 2005, Hak5's mission is to advance the InfoSec industry. We do this through our award winning educational podcasts, leading pentest gear, and inclusive community – where all hackers belong.Quantum Cracks, Citrix & npm Risks - ThreatWireHak52023-11-03 | Support ThreatWire → patreon.com/threatwire
Potential advances in quantum crypto cracking, the ongoing challenges with Citrix Bleed, and npm packages riddled with malware.
____________________________________________ Founded in 2005, Hak5's mission is to advance the InfoSec industry. We do this through our award winning educational podcasts, leading pentest gear, and inclusive community – where all hackers belong.Cisco, VMware, Citrix Vulnerabilities - ThreatWireHak52023-10-25 | Support ThreatWire → patreon.com/threatwire
Cisco's recent zero-day exploit takes an obfuscation turn, VMware alerts users of a significant auth bypass flaw, and Citrix grapples with session hijacking attacks that have CISA raising an eyebrow.
____________________________________________ Founded in 2005, Hak5's mission is to advance the InfoSec industry. We do this through our award winning educational podcasts, leading pentest gear, and inclusive community – where all hackers belong.Payload Triggering Tricks - USB Rubber Ducky Mods for Red Team Engagements - Hak5Hak52023-10-24 | Can we trick our target into triggering a payload on their own computer, while logged in and working? We find out with some crafty payload tricks -- this time on Hak5!
0:00 - Intro 2:03 - Setup 3:17 - Payload Writing 4:22 - Cloning USB devices with ATTACKMODE 5:51 - Passive Windows Detection Extension 9:08 - Activity Detection with DuckyScript 3 12:08 - SMB Canary Keystroke Injection 15:10 - Payload Arming 15:45 - Testing the Payload 17:22 - USB Rubber Ducky Mouse Implant Tips 17:53 - Thank you Hak5 community 18:21 - Review
Our Site → hak5.org Subscribe → youtube.com/user/Hak5Darren?sub_confirmation=1 ____________________________________________ Founded in 2005, Hak5's mission is to advance the InfoSec industry. We do this through our award winning educational podcasts, leading pentest gear, and inclusive community – where all hackers belong.Covertly Implanting a USB Rubber Ducky into a MouseHak52023-10-23 | Glytch is with us again, stuffing ducks into mice, this time on Hak5!...wait what?
____________________________________________ Founded in 2005, Hak5's mission is to advance the InfoSec industry. We do this through our award winning educational podcasts, leading pentest gear, and inclusive community – where all hackers belong.Cisco Zero-Day Exploited In The Wild - ThreatWireHak52023-10-18 | Support ThreatWire → patreon.com/threatwire Darren Kitchen → https://darren.kitchen
+++ Hak5 -- Cyber Security Education, Inspiration, News & Community. Founded in 2005, Hak5's mission is to advance the InfoSec industry. We do this through our award winning educational podcasts, leading pentest gear, and inclusive community – where all hackers belong.High Severity Curl Vulnerability Announced - #threatwire #shortsHak52023-10-11 | Ali discusses CVE-2023-38545 - a High Severity Vulnerability for Curl. #threatwire #hak5
+++ Hak5 -- Cyber Security Education, Inspiration, News & Community. Founded in 2005, Hak5's mission is to advance the InfoSec industry. We do this through our award winning educational podcasts, leading pentest gear, and inclusive community – where all hackers belong.Introducing HIDX StealthLinkHak52023-10-11 | Run a remote shell through a "keyboard" that looks like a normal USB cable. It's O.MG Cable's latest trick! Find all O.MG Devices for sale at hak5.org/omg
____________________________________________ Founded in 2005, Hak5's mission is to advance the InfoSec industry. We do this through our award winning educational podcasts, leading pentest gear, and inclusive community – where all hackers belong.Curl Schedules Security Patch; Linux Hit With Buffer Overflow Flaw - ThreatWireHak52023-10-10 | [!!] ThreatWire Patreon has moved to patreon.com/threatwire - thanks for your support!
23andMe data was found being sold online, Linux was hit with a glibc vulnerability, and Curl schedules a security patch! All that coming up now on ThreatWire.
#threatwire #hak5
ThreatWire by Shannon Morse is a weekly news journalism show covering cybersecurity topics for network admins, information security professionals, and consumers.
Chapters: 00:00 23andMe Data Sold Online 02:27 Linux Hit With Glibc Vuln 05:28 Curl To Release Patch
Links: Resources for stories are available on Patreon exclusively, to protect our channel from being inappropriately flagged as “malicious content”. All links included in my videos are news articles or sources related to each story and are both appropriate for the discussion and legitimate. Access source links at patreon.com/threatwire
Hak5 -- Cyber Security Education, Inspiration, News & Community since 2005:
____________________________________________ Founded in 2005, Hak5's mission is to advance the InfoSec industry. We do this through our award winning educational podcasts, leading pentest gear, and inclusive community – where all hackers belong.