Join Kody Kinzie and Timothy Schellin for an introduction to basic PowerShell for total beginners! We'll go over basic file operations, scripts, and more as we start covering PowerShell tools on Hacking with Friends. Stay tuned for more next week! Sponsored by Varonis www.varonis.com Source: https://www.youtube.com/watch?v=Bb4Tge2qgX4 Uploader: SecurityFWD
Topics: Youtube, video, Science & Technology, PowerShell, Windows, Varonis, Kody Kinzie
In this Hacking with Friends, Tim and Kody explore RedRabbit, a security tool for Windows PowerShell. Come join us to see all the exciting modules this tool has to offer! Source: https://www.youtube.com/watch?v=YY4qLW7LtKA Uploader: SecurityFWD
Topics: Youtube, video, Science & Technology, PowerShell, Windows, Varonis, Kody Kinzie, RedRabbit
Millions of people are working remotely – and attackers are taking advantage. As more workers log into residential WiFi networks, cybercriminals have plenty of opportunities to launch attacks. Varonis security researcher Kody Kinzie created this video to show how easy it is for an attacker to launch an attack using an off-the-shelf hacking tool and trick an unsuspecting user into giving up their WiFi password. Source: https://www.youtube.com/watch?v=nHaJUjhfjjI Uploader: SecurityFWD
Topics: Youtube, video, Science & Technology, Hacking, Hacking WiFi, Airgeddon, Data Security, Varonis,...
With employees all over the world working from home, hackers are at an advantage when users don't have an IT department working in their defense. Kody Kinzie and Timothy Schellin demonstrate just how easy it is for hackers to lure victims into disclosing their Wi-Fi password using a tool called Airgeddon to execute an evil twin attack. After breaking in, hackers can take control of the router, redirect Wi-Fi traffic, steal information and attack other devices on the network. Source:...
Topics: Youtube, video, Science & Technology, Hacking, Hacking WiFi, Airgeddon, Data Security, Varonis,...
How to Set Up Advanced Protection on Your Google Account Full Tutorial: http://bit.ly/GAPsecurity Subscribe to Null Byte: https://goo.gl/J6wEnH Phishing is the most common attack most internet users face, but important users like business executives, journalists, activists, and government workers face additional risks. Sophisticated, targeted phishing and whaling attacks are the new norm for VIPs, and the advantage is stacked towards the attacker. The victim only needs to make one mistake to...
Topics: Youtube, video, People & Blogs, Google Advanced Protection, phishing, whaling, two-factor...
Wi-Fi hacking continues to get cheaper and easier on the ESP8266, as Stefan Kremser and Kody Kinzie explore the advanced new features of the Wi-Fi Deauther. We'll try out tracking Wi-Fi devices, scanning for devices like Ring doorbells or security cameras, and even spying on what networks a device has connected to before, all from a $2 microcontroller! Source: https://www.youtube.com/watch?v=gs5lCJuvFMc Uploader: SecurityFWD
Topics: Youtube, video, Science & Technology, Varonis, VRNS, spacehuhn, Stefan Kremser, Kody Kinzie,...
How to Crack Weak Wi-Fi Passwords Full Tutorial: http://bit.ly/ParrotAir Subscribe to Null Byte: https://goo.gl/J6wEnH In this edition of Cyber Weapons Lab, we explore hacking Wi-Fi with bad passwords. We'll show you how using bad passwords can let anyone with a simple wireless network adapter and laptop hack a network with almost no resistance. Follow Null Byte on: Twitter: https://twitter.com/nullbytewht Flipboard: http://flip.it/3.Gf_0 Source: https://www.youtube.com/watch?v=ejTPWPGP0GA...
Topics: Youtube, video, People & Blogs, null byte, airgeddon, wifi hacking, wpa, wpa2, cracking,...
Canarytokins are like honeypots that can be applied to any file, and routinely catch hackers by alerting when sensitive files are touched. Learn how Thinkst detected unauthorized access to a server that was decommissioned and other wild stories with Adrian Sanabria. Episode Notes Canary Tokens - https://canarytokens.org/generate Learn more about canaries - https://canary.tools/ Adrian's Twitter - https://twitter.com/sawaba Source: https://www.youtube.com/watch?v=Bymw6vXkYpc Uploader: SecurityFWD
Topics: Youtube, video, Science & Technology, SecurityFWD, Varonis, Security, Security Tools Podcast,...
Kody's Twitter: https://twitter.com/KodyKinzie Use of Wi-Fi is incredibly widespread in 2017. In the city of Los Angeles alone, there are hundreds of thousands of wireless networks, many of which touch critical infrastructure. Kody Kinzie is a CS student researching Wi-Fi security, and the tactics people use to hack it. He explains the tactics currently used to break or bypass the technology that makes Wi-Fi secure, and the motivations behind groups who hack Wi-Fi in 2017. For more, check out:...
Topics: Youtube, video, People & Blogs, wifi, hacking, lindset, null byte, nullbyte, pasadena computer...
How to Discover Hidden HTTP Parameters with Arjun Full Tutorial: https://nulb.app/z4x2u Subscribe to Null Byte: https://goo.gl/J6wEnH Nick's Twitter: https://twitter.com/nickgodshall Cyber Weapons Lab, Episode 155 When auditing a website, it can be difficult to find all of the HTTP parameters the page takes. In today's Cyber Weapons Lab video, we'll go over an automated tool for discovering those hidden parameters. That tool is called Arjun. Big shoutout to Null Byte user drd_ whose article...
Topics: Youtube, video, Howto & Style, wht, wonderhowto, nullbyte, null byte, hack, hacking, hacker,...
How to Set Up Google Advanced Protect on Any Device Full Smartphone Tutorial: http://bit.ly/GAPphones Subscribe to Null Byte: https://goo.gl/J6wEnH - Setting up Advanced Protection on Windows: 0:45 - Using keys on Kali Linux: 4:30 - Using keys on Arch: 9:40 - Using keys on macOS: 10:31 - Using keys on Android devices 11:05 - Using keys on iOS devices 12:06 For celebrities, business owners, human rights workers, and other security-conscious users, the threat of phishing can be reduced...
Topics: Youtube, video, People & Blogs, google, security, advanced protection, advanced protection...
Detect & Classify Wi-Fi Jamming with a NodeMCU Full Tutorial: http://bit.ly/NodeLED Subscribe to Null Byte: https://goo.gl/J6wEnH Kody's Twitter: https://twitter.com/KodyKinzie If you suspect your network is under attack, gathering information on what kind of attack is crucial in devising a defensive strategy. With just a NodeMCU, LED light, and a little code, you can create a detection device capable of classifying possible jamming attacks on your network. Today, we'll show you how to...
Topics: Youtube, video, Howto & Style, wht, wonderhowto, nullbyte, null byte, hack, hacking, hacker,...
Use a RPi as a Dead Drop for Private Communication Full Tutorial: http://bit.ly/PiDeadDrop Subscribe to Null Byte: https://goo.gl/J6wEnH Kody's Twitter: https://twitter.com/KodyKinzie In an emergency situation where internet infrastructure can be unreliable, it's advantageous to have an offline alternative to share data and digitally chat with other people. With PirateBox, we'll show you how to use a Raspberry Pi for private offline communication right here on Cyber Weapons Lab. Materials...
Topics: Youtube, video, Howto & Style, wht, wonderhowto, nullbyte, null byte, hack, hacking, hacker,...
Wardrive with Android & Map Vulnerable Networks Full Tutorial: http://bit.ly/WarDrive Subscribe to Null Byte: https://goo.gl/J6wEnH Kody's Twitter: https://twitter.com/KodyKinzie Wardriving has been around for decades, but it's only gotten easier as technology has improved to the point that you can get started with a simple smartphone. In this video, we'll show you how to map and explore the security of every network you walk or drive by on this episode of Cyber Weapons Lab. Follow Null...
Topics: Youtube, video, Howto & Style, wht, wonderhowto, nullbyte, null byte, hack, hacking, hacker,...
How to Boot Up Multiple Operating Systems on a Raspberry Pi Full Tutorial: http://bit.ly/BerryBootPi Subscribe to Null Byte: https://goo.gl/J6wEnH Kody's Twitter: https://twitter.com/KodyKinzie The Raspberry Pi is an incredibly versatile device capable of running various operating systems. Trying a new OS can be cumbersome without the ability store more than one per Pi. In this video, we'll show you how to boot multiple OS's using BerryBoot on this episode of Cyber Weapons Lab. Recommended...
Topics: Youtube, video, Howto & Style, wht, wonderhowto, nullbyte, null byte, hack, hacking, hacker,...
Earn $$. Learn What You Need to Get Certified (90% Off): https://nulb.app/cwlshop How to Investigate Emails, URLs, Files & More in Your Browser Full Tutorial: https://nulb.app/x51lh Subscribe to Null Byte: https://goo.gl/J6wEnH Kody's Twitter: https://twitter.com/KodyKinzie Cyber Weapons Lab, Episode 188 Gathering OSINT information is always easier with browser extensions, and Mitaka is a browser extension with OSINT investigations in mind. In this episode of Cyber Weapons Lab, we'll...
Topics: Youtube, video, Howto & Style, wht, wonderhowto, nullbyte, null byte, hack, hacking, hacker,...
Use an RPi for Monitor Mode Without an External Adapter Full Tutorial: http://bit.ly/MMforPi Subscribe to Null Byte: https://goo.gl/J6wEnH Kody's Twitter: https://twitter.com/KodyKinzie The Raspberry Pi is already a powerful device perfect for on-the-go hacking or war driving. But up until recently, no Pi has been capable of being put into monitor mode or achieve packet injection without a wireless adapter. We'll show you how you can update your Pi to make it an all-in-one hacking device on...
Topics: Youtube, video, Howto & Style, wht, wonderhowto, nullbyte, null byte, hack, hacking, hacker,...
How to Create a Test Hacking Computer with a Raspberry Pi Full Tutorial: http://bit.ly/DV-Pi Subscribe to Null Byte: https://goo.gl/J6wEnH Kody's Twitter: https://twitter.com/KodyKinzie Every hacker needs to practice their skills, and finding a vulnerable device can be pretty hit and miss. In this video, we'll show you how to turn a Raspberry Pi into a deliberately vulnerable server for all your hacking needs on this episode of Cyber Weapons Lab. Recommended Raspberry Pi Kit:...
Topics: Youtube, video, Howto & Style, wht, wonderhowto, nullbyte, null byte, hack, hacking, hacker,...
How to Find Hidden Subdomains from Certificate Trust Logs Full Tutorial: http://bit.ly/CTexposer Subscribe to Null Byte: https://goo.gl/J6wEnH Kody's Twitter: https://twitter.com/KodyKinzie Certificate Trust logs are a security feature designed to prevent attackers from creating malicious subdomains to trick users. Unfortunately, it also creates a list of all the various subdomains that have a certificate attached, sometimes revealing private information a company might not want public. We'll...
Topics: Youtube, video, Howto & Style, wht, wonderhowto, nullbyte, null byte, hack, hacking, hacker,...
Get Our Premium Ethical Hacking Bundle (90% Off): https://nulb.app/cwlshop How to Use Sparrow-wifi to Conduct Wireless Reconnoissance Full Tutorial: https://nulb.app/z51lg Subscribe to Null Byte: https://goo.gl/J6wEnH Kody's Twitter: https://twitter.com/KodyKinzie Cyber Weapons Lab, Episode 182 Recon is an important step in various hacking scenarios. Gathering data on the network environment around you can give you an edge in finding and exploiting vulnerabilities in the devices you're...
Topics: Youtube, video, Howto & Style, nullbyte, null byte, hack, hacking, hacker, hacks, hackers, how...
Earn $$. Learn What You Need to Get Certified (90% Off): https://nulb.app/cwlshop How to Make an Offline Text-Based Chat System Full Tutorial: https://nulb.app/z6vu2 Subscribe to Null Byte: https://goo.gl/J6wEnH Kody's Twitter: https://twitter.com/KodyKinzie Cyber Weapons Lab, Episode 164 Sometimes, you need an offline way of communication, such as after a natural disaster, during a protest demonstration, or where there is just no cellular or Wi-Fi networks to get you online. In this Cyber...
Topics: Youtube, video, Howto & Style, wht, wonderhowto, nullbyte, null byte, hack, hacking, hacker,...
How to Set Up a Friend Detector That Tracks Friendly Devices Full Tutorial: http://bit.ly/FriendDet Subscribe to Null Byte: https://goo.gl/J6wEnH Kody's Twitter: https://twitter.com/KodyKinzie MAC address randomization is a feature new smartphones have to help prevent tracking by third parties. However, it's a fairly easy to defeat. Today, we'll show you how to detect the signals smartphones use to connect to Wi-Fi networks via an ESP8266 NodeMCU and Friend Detector on this episode of Cyber...
Topics: Youtube, video, Howto & Style, wht, wonderhowto, nullbyte, null byte, hack, hacking, hacker,...
How to De-cloak & Connect to Devices using a Beacon Swarm Full Tutorial: http://bit.ly/BeacSpam Subscribe to Null Byte: https://goo.gl/J6wEnH Kody's Twitter: https://twitter.com/KodyKinzie When tracking a target, discovering the device MAC address is essential. However, smartphone manufacturers program their devices to give a randomized MAC address when connecting to a Wi-Fi network. By combining the karma attack, the ESP8266 Beacon Spammer, and research by Mathy Vanhoef, we'll show you how...
Topics: Youtube, video, Howto & Style, wht, wonderhowto, nullbyte, null byte, hack, hacking, hacker,...
Earn $$. Learn What You Need to Get Certified (90% Off): https://nulb.app/cwlshop Three Ways Hackers Can Hack into SSH Servers Full Tutorial: https://nulb.app/z4ikd Subscribe to Null Byte: https://goo.gl/J6wEnH Kody's Twitter: https://twitter.com/KodyKinzie Cyber Weapons Lab, Episode 181 The Secure Shell, or SSH, is a common way to access remote hosts. However, it's not as secure as the name would imply. In this episode of Cyber Weapons Lab, we are going to show three different ways to brute...
Topics: Youtube, video, Howto & Style, wht, wonderhowto, nullbyte, null byte, hack, hacking, hacker,...
How to Conduct MitM Attacks Using a RPI & Wi-Fi-Pumpkin Full Tutorial: http://bit.ly/PumpkinPiAP Subscribe to Null Byte: https://goo.gl/J6wEnH Kody's Twitter: https://twitter.com/KodyKinzie A popular trick up a hacker's sleeve is scoring a glimpse into the computing activity of their target. With the just a Raspberry Pi equipped with MitM framework and the ability to create rogue access points, a hacker can take this trick on the go. We'll show you how to build the ideal hacking Pi with...
Topics: Youtube, video, Howto & Style, wht, wonderhowto, nullbyte, null byte, hack, hacking, hacker,...
Our Premium Ethical Hacking Bundle Is 90% Off: https://nulb.app/cwlshop What Hacking Looked Like from 1985–1990 Full Tutorial: https://nulb.app/x4lds Subscribe to Null Byte: https://goo.gl/J6wEnH Michael's Twitter: https://twitter.com/The_Hoid Cyber Weapons Lab, Episode 158 In today's episode of Cyber Weapons Lab, we're going to explore what hacking looked like in the 1980s and ' through a hacking video game called Telehack. You'll learn everything you need to know about navigating the...
Topics: Youtube, video, Howto & Style, wht, wonderhowto, nullbyte, null byte, hack, hacking, hacker,...
Use a Smartphone to Scan & Map Wireless Networks Full Tutorial: http://bit.ly/FingMap Subscribe to Null Byte: https://goo.gl/J6wEnH Kody's Twitter: https://twitter.com/KodyKinzie Joining a wireless network is like an unlimited pass to snoop around for devices that are connected, often uncovering vulnerabilities the owners may not be aware of. In this video, we'll show you how to use a smartphone to map a wireless network and even connect to devices like a Raspberry Pi on this episode of...
Topics: Youtube, video, Howto & Style, wht, wonderhowto, nullbyte, null byte, hack, hacking, hacker,...
Earn $$. Learn What You Need to Get Certified (90% Off): https://nulb.app/cwlshop How to Use a Packet Squirrel to Capture LAN Traffic Full Tutorial: https://nulb.app/z5hwp Subscribe to Null Byte: https://goo.gl/J6wEnH Kody's Twitter: https://twitter.com/KodyKinzie Cyber Weapons Lab, Episode 178 A hacker and pentester has many tools in their arsenal. When a hack sometimes requires physical access to a device, one such tool that is particularly handy is the Hak5 Packet Squirrel. On this episode...
Topics: Youtube, video, Howto & Style, wht, wonderhowto, nullbyte, null byte, hack, hacking, hacker,...
How to Use an RTL-SDR Dongle on an Android Phone Full Tutorial: http://bit.ly/SDRandroid Subscribe to Null Byte: https://goo.gl/J6wEnH Kody's Twitter: https://twitter.com/KodyKinzie The RTL-SDR is a cheap, powerful software-defined radio dongle that is popular in the hacker community. While it can be annoying to set up, using it on an Android device is free and surprisingly easy. Once set up, you can listen to radio conversations from a wide range of radio frequencies. Police dispatch traffic,...
Topics: Youtube, video, Howto & Style, wonderhowto, nullbyte, null byte, hack, hacker, hacks, hackers,...
Airgeddon Used for an Evil Twin AP with Captive Portal Full Video: https://nulb.app/x4a3p Subscribe to Null Byte: https://goo.gl/J6wEnH Kody's Twitter: https://twitter.com/KodyKinzie Cyber Weapons Lab, Episode 010 (Recut - Partial Episode) Wi-Fi networks can be set up by smart IT people, but that doesn't mean the users of the network are similarly tech-savvy. We'll demonstrate how bad actors can use am evil twin attack to steal Wi-Fi passwords. Essentially, they kick a user off their trusted...
Topics: Youtube, video, Howto & Style, wht, nullbyte, hacker, hacks, hackers, how to hack, howto, how...
How to Hack FM Radio Frequencies with an RPi Full Tutorial: http://bit.ly/FMhack Subscribe to Null Byte: https://goo.gl/J6wEnH Kody's Twitter: https://twitter.com/KodyKinzie There's an entire spectrum of information that surrounds us. With a Raspberry Pi and some simple know-how, you can take social engineering or a simple prank to the next level by hijacking radio frequencies on this episode of Cyber Weapons Lab. Guide on setting up a headless Raspberry Pi: http://bit.ly/HeadlessPi Recommended...
Topics: Youtube, video, Howto & Style, wonderhowto, nullbyte, null byte, hack, hacking, hacker, hacks,...
Earn $$. Learn What You Need to Get Certified (96% Off): https://nulb.app/cwlshop How to Get Started in 3D Printing Full Tutorial: https://nulb.app/x7fhv Subscribe to Null Byte: https://goo.gl/J6wEnH Kody's Twitter: https://twitter.com/KodyKinzie Cyber Weapons Lab, Episode 169 Getting started with 3D printing is easy with printers like the Creality Ender 3 and other cheap open-source printers. Once you find other people's prints on the internet, you can try them out yourself, and then try...
Topics: Youtube, video, Howto & Style, wht, wonderhowto, nullbyte, null byte, hack, hacking, hacker,...