Ex-NSA hacker tools for real world pentesting



What do you understand about hacking? Do you assume getting involved in somebodies facebook account or google account is called hacking? No. Not truly. In computer system networking, Hacking is any kind of technical initiative to adjust behaviour of network links and also connected systems.

Hacking is traditionally referred to positive, clever technological work that was not always relevant to computer systems. When did hacking stem?

Harmful attacks on computer networks are officially known as cracking, while hacking genuinely uses only to activites having excellent intents. Hacking on computer networks is frequently done with scripts or other network programming.

These programs usually adjust information travelling through a network link in means made to acquire even more info concerning just how the target system works.

A few very skilled cyberpunks work for industrial firms with the task to secure that firm’s software program and data from outside hacking. Fracturing techniques on networks consist of creating worms, launching denial of solution (DoS) attacks, or establishing unapproved remote accessibility links to a device.

Please offer it a thumbs up if you like this video clip. For even more such video clips, just struck the subscribe switch. And also as constantly thanks for seeing.

Do you assume getting into people facebook account or google account is called hacking? In computer system networking, Hacking is any type of technical effort to adjust practices of network connections as well as linked systems.

Hacking is traditionally referred to useful, creative technological work that was not necessarily relevant to computer system systems. Malicious attacks on computer networks are officially understood as cracking, while hacking really uses just to activites having good intentions.

Hacking

#ExNSA #hacker #tools #real #world #pentesting

Learn real world pentesting plus which tools are the best to use with Ex-NSA Hacker Neal Bridges. Neal tells us what he carries in his backpack when doing real world pentests.

My apologies for the issues with this video. I had to remove the previously uploaded video because I had movie clips like Mr Robot and The Spy Game in the video and YouTube didn’t like them… so I had to remove the video 🙁

Menu:
Introduction: 0:00
Neal sees pentesting differently: 1:17
Neal’s advice from experience: 2:00
Neal’s 5,000 pentests: 3:18
Take NSA and experience: 4:30
Preparation is key: 5:10
OSINT: 5:50
Actual Pentest report: 6:30
Pretexting: 7:50
Another real world example: 8:45
Planning is very important: 9:30
Leave stuff in your car? 10:15
Right tools for the job: 11:55
Top tools: 12:05
Extra cables: 12:30
Hak5 Ethernet cable: 12:58
Is Hak5 a necessity: 13:10
Rubber Ducky: 13:57
Hak5 are great: 14:30
Real world example of equipment: 15:00
You can create your own stuff: 15:30
Your time is money: 16:10
Proxmark: 16:30
Crazy RFID reader: 17:30
Poor planning RFID example: 18:50
Your time is worth something! 20:20
Hone your tradecraft: 21:00
Proxmark explanation: 21:20
A reader doesn’t give you access. You need a pretext: 21:50
Social engineering: 23:50
You need a story: 25:50
Social Engineering vs tech: 26:04
Physical access is king: 29:00
What to do once past the door: 30:00
Military facility pentest: 31:19
Look for a network port: 33:27
You want to get out of there: 34:49
Hak5 Lan turtle: 35:04
Back of computer vs switch: 36:35
Pop it into the back of the computer: 37:32
What about WiFi: 38:11
TP-Link WiFi Card: 38:50
Ubertooth: 39:50
HackRF One: 40:50
Hak5 Pineapple: 41:56
SDR: 42:09
Real world example: 43:00
Alfa Network Adapter: 44:13
Wifi Hacking: 44:50
Alfa not practical so much: 44:49
You cannot charge for a WiFi pentest: 46:20
You are making it real: 47:17
WiFi can be social engineering: 47:45
Captive portal: 48:47
Rogue Access point: 49:40
Real world wifi pentest example: 50:40
Port Security: 51:30
Hak5 Pineapple access corporate network: 51:57
Always social engineering: 52:34
Pyramid of pain: 53:00
Stuxnet: 53:14
Telsa attack: 54:45
NSA examples: 55:07
Human Intelligence Hacking Example: 56:32
Another hacking example: 58:40
WiFi hacking example: 1:00:18
Neal’s photo while hacking: 1:01:32
Once inside, you are trusted: 1:03:22
Summary of devices: 1:03:40
Hak5 switch: 1:03:55
Extra cables: 1:04:08
Hak5 Rubber Ducky: 1:04:15
Hak5 Pineapple: 1:04:30
Hak5 Bash Bunny: 1:04:54
Hak5 Packet Squirrel: 1:04:58
Ubertooth: 1:06:26
Proxmark: 1:06:31
Value of networking knowledge: 1:07:00
Neal got his CCNA: 1:07:32
Very few companies use port security properly: 1:08:50
Cain and Abel: 1:10:08
Are zero days worth it: 1:11:00
Shiny objects vs Neal’s wisdom: 1:12:05
Real world hard talk: 1:13:37
What do you recommend: 1:14:25
Neal and David going to do something: 1:16:55

=======================
Buy Hak5 coolness here:
=======================
Buy Hak5: https://davidbombal.wiki/gethak5

============================
Buy ShareBrained Technology:
============================
PortaPack: https://www.sharebrained.com/

================
Connect with me:
================
Discord: https://discord.com/invite/usKSyzb
Twitter: https://www.twitter.com/davidbombal
Instagram: https://www.instagram.com/davidbombal
LinkedIn: https://www.linkedin.com/in/davidbombal
Facebook: https://www.facebook.com/davidbombal.co
TikTok: http://tiktok.com/@davidbombal
YouTube: https://www.youtube.com/davidbombal

================
Connect with Neal:
================
YouTube: https://www.youtube.com/cyberinsecurity
LinkedIn: https://www.linkedin.com/in/nealbridges/
Twitter: https://twitter.com/ITJunkie
Twitch: https://www.twitch.tv/cyber_insecurity

hak5
hackrf one
ubertooth one
rubber ducky
lan turtle
wifi pineapple
omg cables
omg cable
hak5 rubber ducky
hak5 omg cable
omg cable android
omg cable ios
usb rubber ducky
bash bunny
shark jack
hak5 bash bunny
hak5 shark jack
packet squirrel
hak5 packet squirrel
lan turle
hak5 lan turle

Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel!

#hacking #cybersecurity #hak5

hak5,rubber ducky,cybersecurity,ethical hacking,kali linux,how to hack,ethical hacker,hacking tutorial,ethical hacking course,bash bunny,hak5 pineapple,hak5 omg cable,hak5 rubber ducky,hak5 elite field kit,hak5 shark jack,hak5 wifi pineapple,hak5 bash bunny,hak5 lan turtle,ubertooth,mr robot,ethical hacking tutorial,hackrf one,cyber security,ethical hacking career,pentest,pentesting,hackers bag,hacker,hacking,learn hacking,nsa hacker,nsa,Nsa hack

01:16:40

1634945641

193382

4.88