HAK5 hacking gear

Hak5 Gear Overview

WiFi Auditing

  • Pineapple Mark 7: A powerful device for creating rogue access points, performing man-in-the-middle attacks, and capturing credentials from vulnerable wireless networks.
  • Pineapple Mark 7 Adapter: Enhances the Pineapple’s range and performance with dual-band (2.4 GHz and 5 GHz) support, improving network testing accuracy and efficiency.

Covert Data Collection

  • Key Croc: A USB cable disguised as a keylogger, capable of capturing keystrokes and executing payloads for stealthy data gathering on compromised machines.

Network Penetration Tools

  • Shark Jack (x2): A portable network penetration tool, controlled via a smartphone and loaded with payloads for tasks like Nmap scans to discover open ports and vulnerabilities. It is phone-connected with Kali Nethunter for remote, on-the-go deployment.
  • Shark Jack (Battery-Powered): Holds two preloaded payloads and is typically used for Nmap scanning to identify network vulnerabilities.

Backdoors and Remote Access

  • LAN Turtle: A covert Ethernet-based tool that allows for remote access to internal networks, useful for persistent access, data exfiltration, and monitoring.

USB-Based Attacks

  • Bash Bunny: A multi-functional USB attack device for automating credential theft, network attacks, and system compromises on target machines.
  • OMG Cable Elite (USB to USB-C): A malicious USB cable capable of performing keystroke injections, stealing data, and executing payloads remotely once connected to a target device.
  • OMG Plug Elite: Similar to the OMG Cable, this plug enables remote control and keystroke injection, ideal for maintaining undetected access to target devices.

USB Rubber Ducky

  • USB Rubber Ducky (2x): A popular and powerful USB device that acts as a human interface device (HID), injecting predefined keystrokes rapidly to execute commands and deploy payloads on target systems.

Defensive Tools

  • OMG Malicious Cable Detector: A defensive tool to detect compromised cables like OMG cables, helping protect against stealthy attacks.

Customization and Programming

  • OMG Programmer: Used to configure and program OMG cables with custom payloads, tailored to specific attack scenarios.