Presented at
DeepSec 2016 „Ten“,
Unknown date/time
(Unknown duration).
From wireless fundamentals to physical access security, man-in-the-middle attacks and precision WiFi exploitation, this workshop builds the competence to effectively exploit a range of Hak5 developed penetration testing tools.
Learn directly from the developers of the WiFi Pineapple, USB Rubber Ducky and LAN Turtle to get the most from these leading penetration testing platforms. Lectures and hands-on exercises emphasize responsible best practices and integration with popular penetration testing workflows.
Provided in this class are a WiFi Pineapple NANO, LAN Turtle, USB Rubber Ducky along with ISO/VM and course material. Students must bring a notebook computer capable of booting a USB live Linux OS or Virtual Machine.
About the Tools:
The WiFi Pineapple is the gold standard rogue access point. Capable of mimicking any hot-spot, this honeypot is highly effective at auditing modern WiFi devices. Managed in person or remotely through a simple web interface, the operator is uniquely poised as a man-in-the-middle enabling intelligence gathering, host redirection, credential capturing and so much more.
The USB Rubber Ducky is the original Keystroke Injection Attack tool. Posing as a generic USB Drive it's a social engineer's best friend. The open source tool is easily programmed allowing it to deliver automated keystrokes capable of gathering intelligence, installing backdoors, exfiltrating data and more - all while bypassing most prevention measures.
The LAN Turtle is a covert Systems Administration and Penetration Testing tool providing stealth remote access, network intelligence gathering, and man-in-the-middle monitoring capabilities. Housed within a generic "USB Ethernet Adapter" case, the LAN Turtle's covert appearance allows it to blend into many IT environments.
Presenters:
-
Robin Wood
- Hak5 LLC, Digininja
Hacker, coder, climber. Co-founder of SteelCon, author of many tools, always trying to learn new things.
-
Sebastian Kinne
- Hak5 LLC, Digininja
Sebastian Kinne is the lead developer of the WiFi Pineapple. Prior to hacking fruits, he reverse engineered MMORPG network protocols while completing his BSc in Computer Science. As a continuous presenter at the DEFCON Wireless Village and B-Sides London, he has probably tracked your smartphone's WiFi in a demo or two.
-
Darren Kitchen
- Hak5 LLC, Digininja
Darren Kitchen is the founder of Hak5, an Internet television show inspiring hackers and IT pros since 2005. Breaking out of the 1990s phone phreak scene, Darren has continued to foster his passion for information security throughout his career as a systems administrator, presenter and creator of best selling penetration testing tools.
Links:
Similar Presentations: