Hak5 - Stealing Windows passwords. the Katana USB boot key

Hak5 - Stealing Windows passwords. the Katana USB boot key


Stealing Windows passwords with a crafty Metasploit Keylogger - Mubix explains. Shannon's hacking from a cave with the Katana USB boot key, automated file renamers Firefox security extensions and more
Closed Caption:

wore this time on the show
firefox security extensions sweet
security suite for your flashdrive bulk
renaming files in windows and a whole
lot more this time on hak5 this episode
of pack 5 is brought to you by harvest
time tracking and invoicing go to get
harvest . com / hak5 for free 30-day
trial domain.com your next big idea
starts at domain.com and go to assist
expressed support smarter with go to
assist express lo look Mac pod my name
is Darren kitchen and I'm Shannon Morse
this is of course your weekly dose of
technol list
hey great show for you guys this week
yes awesome ciao kind of an odd one
because i am on a horse no I'm on
Josette i'm on a horse
am I motorcycle old spice
yes here are diamonds and motorcycle who
why are you on a motorcycle well I mean
this might be the last opportunity I
have to do an episode 5 release in this
season where I'm sitting on a motorcycle
which is just ridiculous l to do on the
show yeah I guess so it can't really get
up steps can it known that we could
never have done it in the hack house and
it just makes sense to of course at
least in my mind I don't know
and also it's an honor of the back
across America tour which when this is
airing on May eleventh that means one
year ago today we may love to whatever i
will have been in Toronto thinking about
Toronto can't go a lot of the links and
then to Detroit and that was a bad about
different story
yeah yeah there's a restaurant trip and
it's kinda hard to believe that it's
been almost a year now since movie yeah
you're kidding very much for you guys
but you're through a California boy now
well I mean I got some granola and my
eyes are not hearing about your health
and stuff yeah you probably didn't tune
in to hear about granola though you
probably want to hear about some hacker
headlines and that's why we're talking
about our favorite framework just got a
major update yes we're talking about
metasploit 3.7 . o which has been really
then with it comes some major backhand
back and overhauls so you should
probably see a huge significant increase
in performance especially when handling
multiple sessions as well as a nice
little update to the SMB stack which
will allow you to perform pass the hash
attacks against windows server 2008 so
for more on that and the 35 some odd new
remote exploits check out rapid seven
square
yes square will be like square i love is
a credit card so I can swipe your card i
have a credit card with a kitten on it
yeah hello kitty square its backwards
worth it works better with the magnetic
swipe set section well in HD now so
don't show that numbers too much right
but well square has opted for encryption
on their little mobile code credit card
readers so in between this guy in this
guy the data will be encrypted ya
bunches was very fun was all freaking
out about right
exactly so square there a successful
company that enables just about anyone
to be able to take payments through
their iphone went through a benefit of
with four verifone back in the day who
recently said that square was basically
sending out card skimmers to whoever
wanted them and it sounds like square
deemed it necessary to update their
hardware and decided to make it a new
line of the square credit card readers
so it sounds like squares becoming a
real competitor to verify which i'm
looking forward to begin original 12
partnered with visa and hey i just got
to say well I've got the old version
encrypted yeah yeah what else is still
is an encrypted consolidated . DB yes
the iOS 4.3 . 3 update has arrived
bringing changes to the way that
controversial crowd source database
caching file works consolidated DB file
was the one that had all of your
information about where you're you know
3g ipad or your iPhone yeah has been
yeah and while they have some made some
changes to it reducing the file size of
it so it's like how long is actually
going to cast some people's up to a year
it's no longer going to back up to
itunes when you sink and it's also going
to delete itself our it's going to be
deleted when you turn off location
services now Apple is acknowledged that
it's been storing as
to the years worth of data even if
location services were turned off before
and they claimed that to be a bug
now of course database is still
unencrypted yeah it's a bug that they
decided not to fix until they started
complaining about it would go figure
so okay I have some really really nice
news to hear about something happy
yes something happy Jeff Moss he's the
founder of the infamous hacker currency
and jess con yes dark changes he back in
def con las vegas he's been named as I
can which is the Internet Corporation
for Assigned Names and numbers their
chief security officer rod Beckstrom
he's the ICANN predator president and
the chief executive officer he said I
can think of no one with a greater
understanding of the security threats
facing internet users and how best to
defend against them then Jeff Moss he
has an in-depth in siders knowledge and
can only come from fighting in the
trenches of the ongoing war against
cyber threats so good job Jeff that's
awesome that's awesome and we should put
that in the last in the line because it
is really on uplifting and you want to
talk about cyber threats
well at the time of filming a
playstation network is still down
following the massive data Bridge sony
is claimed before the US House of house
committee of Energy and Commerce that
file named anonymous was found during
their investigation and now the file
contains the words we are legion
akio's oh hi re so i can't pronounce
that chairman of the board of directors
at sony computer entertainment america
explained by well anonymous would
previously been conducting a large
sealed
a denial-of-service attack on 70 during
the whole geo hi case denied involvement
but that's kind of on a part of their
slogan interest rate how interesting
and now we have some wonderful wonderful
news from Kirby who has chosen her j-pop
group of the week
ok
yeah
do you have what it takes to compete in
our crack the code challenge brought to
you by go to assist express test your
skills in our private lab network and
bid for the title Supreme Leader tax or
winners will be featured on a future
episode of pack 5 our next event will be
on Sunday May 21st at three p.m. pacific
time visit hak5 dot org slash challenge
for all of the details will be live
streaming at had five dot org slash live
throughout the day so I'll see you there
and now we'd like to thank go to assist
express for making the challenge
possible if you're an IT software
consultant you're always looking for
ways to compete with the big guys
problem is you like me or no one man
show now if you need remote support tool
the best is go to assist express the
faster you can connect to a customer the
faster you can move on to the next
challenge reduce your travel time and
increase revenue by handling multiple
support request at once brought to you
by citrix you know go to this expresses
easy and secure try to go to assist
express free for 30 days for this
special offer visit go to assist calm /
hak5 again that's go to assist com /h a
k5 for a free trial
we got an email from chris g AKA macro
hard in the hak5 forums who said this
was the free bulk renaming software i
was going to try out i have a vendor
that likes to send me a large assortment
of fires with a lousy extension name and
I need to work on getting them to
process for a document retention simple
system book rename utility is available
at boca rename utility . coat UK this
website right here and it lets you
rename several files with a click of
your mouse this free software comes in
both 32 or 64-bit for windows after
downloading and installing choose a
folder or a group of files that you want
to change for my example i have chosen a
whole bunch of pictures from this nice
little zoo crew that we had going on
some some of which are kind of bad
pictures after highlighting all of your
files so control a choose what you want
to change so for my example I chose to
change the filenames all to zoo crew
instead of IMG . 026 or whatever they
were called and I changed all the cases
to the lowercase make it nice and easy
for me and then i added a numbering to
the end of each photo so it's not all
the same name because that wouldn't work
out too well so under numbering box10 I
chose suffix and starting with number
one all of your changes can be seen
under new name in the file box at the
top right here highlighted in green
once finished click rename and you will
get a warning telling you that the files
are about to be changed so rename and it
tells me a hundred and forty files are
about to be processed i'll click ok and
its successful i'm going to open these
up in my desktop just to show you what
it looks like after they've been changed
what's wrong folder
ok and you can see here that each one
has been changed to zoo crew 1234 what
have you click OK after double checking
into that all of your selected files
have been fixed in a couple of seconds
if you choose to do this during an
install you can also have a Windows
Explorer extension included when you
right-click a series of files so it
should show up up here is bulk rename
here so i can always just click on that
to do all my renaming this saves me tons
and tons of time renaming all of those
photos from CES so you guys have a tip
will share it tips at hak5 dot org and
now
hey Darren I think it's time for your
segment
alright guys we have a fantastic treat
for you guys this week because we have
none other than move it from room 362
and now it's what that did was going
doing so great it's so good to have you
out here you've been so busy running
between room 362 and rapid seven and
they can you really be like rapid so
yeah you had no right
literally they stay true to the name
yeah maybe you've been having so much
fun with metasploit i take it the new
3.7 is out at six you gotta get update
doing some really fun stuff like as soon
as rapid7 took all of them now they got
funding and it just took off if you want
watch like the ESPN stream of like their
dev work it goes through 2003 up down up
down up there and then 2009 end of
$MONTH 2009 I think it's enough 2010 so
we're just go one else to create I mean
just the framework itself is like kind
of the factors to enter you know later
built into all of the good ones you know
it's so great to see that well we
actually have a fantastic segment for
you guys here we're going to be using a
little bit of metal plate you know how
it is that we're still prepping for the
segment I hate to do this but we're
under strict schedule here and I'm
promised that we will get this here
momentarily anything else you need i got
that executable for you interested in a
problem and I'm just trying to bring a
little shell script here in the meantime
yeah
hey could you get your comfort yeah i
think i had one open you know from
thanks thanks
I got to resolder this
there's my problem
your password starts with e EF m520 for
d68 underscore underscore pound pound !
that's my password
yeah so smart lockers a script that
Chris gates and i wrote for the best .
project and what it does it's my
password gets faster but it does it in a
very interesting way how did you just do
that
alright so keyloggers in general work on
loggers alright 1994 hey if they work
they work you know the usual words
you're already giving did you get my
hash in crack I mean that's a damn good
password wouldn't you say
and donate for a good windows box right
so keyloggers in general will log
everything right
yeah but you can find them their binary
they were they're running they're always
there right anybody that's played with
the Switchblade know it's like every AV
under the planet no matter how you pack
is going to notice your key logger right
because it does special calls
well metasploit or the motor / you know
payload actually has a keylogger built
into it but with cool thing is is that
it's all in memory
ok but the downside yet still upside of
it is they don't only see stuff that is
in that process so if you say tided to
Internet Explorer I explorer.exe only
see that stuff in that process which is
great because if i went to log into a
website for instance you could see my
password is right then right correct and
most loggers only key log when you're
logged in
oh I don't see how you wouldn't be able
to because when you log out
you're not in that active session
anymore all of those programs are like
behind your and kind of a different user
land if you look of a win log on . exe
so when log on the AC is where all the
authentication happens it's Gina or ms
gina that's on back end of it but it's
how you know authentication happens when
you're logging into it so what smart
Walker does is it migrates you're mature
procession into when logon even knows if
there are multiple sessions on that
system you have to say hey there's
multiple sessions which do
also it was like a terminal service
thing and like I got log so how did ok I
understand that your key logging and log
on . exe right so you're getting my
password as I type it into the back but
it doesn't it doesn't do that like
automatically it waits for specific idle
time once it's in winlock wrong and once
once a specified log idle time happen so
you have to be away from how they don't
know you're going to like on a penthouse
sit around all day and all night waiting
for them to come by the next morning and
login
nope so after the special amount of time
it locks the computer out so I haven't
edited it yet but so by the time this
airs i have hopefully have this edited
so even if the screen server goes on it
locks it out but right now it just does
it after a set number of time so you
could say three minutes of inactive time
we go ahead and lock the screen
yep i wouldn't look too odd if say you
already had your setup to lock the
screen after 5-10 minutes exactly
you go and get a coffee you come back
you're like oh you don't think any of
the wiser because it's just a logon
screen and your instinctively trained
like a monkey to type your login login
screen it so you know that it
the great thing about the keylogger for
metasploit is that urn interpreter is
that will show you back spaces and stuff
like that just like a normal keylogger
right is also bc when a half up and half
alright so it up
it also stops keylogging as soon as it
finds that you've logged in so it
detects when that when logon is no
longer active and then it's not memory
anymore I don't detect it right that is
so super sweet how do i do that and in
medicine actually so I've already got an
interpreter session with my victim
what do i initiate to to use this for
the online so first of all you have to
be an added it smoker will actually say
you're not an admin go away
okay so get admin that's all your
privileges however you may be right
so you have to be admin or system-level
to do is sure because what it does
migrates into in log on which is wrong
as system no matter how many sessions
are open and login has always been a
system causes of the beautiful to do to
a terminal server you know sand
lots of users on it yeah okay so so once
you've got the sidereal break is that
medicine we actually can be g run or
background run so this is really great
for when you get a ton of sessions on a
fish you can say auto BG run like
automatically sending this to the
background and so every session you get
in automatically smart locks
ok so you're just like on your client of
your massive line you're just like
sitting there doing your thing you've
got all of these just running in the
background weight and as soon as you got
passwords you get alerted or something
that is that's wicked
ok so where is this in the tree where
I'm going to find this so all it is is
an interpreter script right now I should
push it to the post modules but i
haven't yet I it so you just run marker
tak h will give you the options and
there's a bunch of different options
like how long the heart beat him also
how long to wait and listen for idle
times it and and checking for you know
knew when the password goes in so if you
have a few starts marker at like eight
o'clock at night not something you want
to make the heart beat pretty long so
that you're not like keylogging for a
while or Twitter that is still great and
this is this is the reason to use
medicine is the reason why you know you
get lucky and get get cow every time you
launch the playwright yeah so i mean the
the power behind it is all something
called railgun and what real gun is on
on metasploit interpreter is a drink
access to the windows api so I call lock
workstation actual call to using railgun
over the windows api the locker
recreation
so it's just a function built right into
windows i love that that is so any
longer for windows my window I think you
know that is so great that it's just
there for you for the taking and movies
here to take it
Rob I know you're busy man but thank you
so much for coming by the studio thanks
for doing all the great stuff you do
that room 362 you gotta check out this
awesome stuff you've got great articles
about medical your transplant as well
your scripts wallpaper scripts all
you're gonna have to come back and show
me some wallpaper script right some good
season picture anyway we're gonna kick
it right over to Shannon for this week's
tribute last week's trivia question was
the UK version of this device represents
ten pence with a 1000 Hertz tone what is
the device and the answer was redbox
this week's question is serving the
Pacific Northwest Midwest and the Rocky
Mountains this regional Bell operating
center has merged with neither verizon
or AT&T answer at hak5 dark slash trivia
to win some awesomely cool sweet swag
and now a word from our sponsor harvest
is a web-based time tracking application
relied upon by creative and
technology-driven teams in over a
hundred countries worldwide with harvest
can quickly and easily track projects
time and optionally invoice your clients
online with harvest you can quickly see
how your projects are progressing with
powerful visual reports and make better
decisions about where you and your team
are spending your days most valuable
resource time are miss visual reports
gives you an overview of your log
$OPERAND hours and how much of your time
is on
avoid four teams quickly see where your
time is going including what's taking up
the most time harvest native iPhone and
Android companion apps let you track
time and expenses on the go
whether your online or offline you can
even snap a picture of your receipts and
upload them to harvest account learn
more with a 30-day free trial i get
harvest calm / hak5 and sign up using
coupon code hak5 to get an additional
fifty percent off your first month after
that
ok
last week i demoed the easy way to
install con boot and way back in season
eight I had showed you katana katana is
a portable multiboot security suite with
all sorts of penetration and secure the
applications all built into one single
flash drive it had been updated as time
since way back when so i wanted to do a
quick follow-up on this lovely piece of
awesomesauce version to point out first
of all closed down all of your antivirus
software it's going to freak out when
you download katana due to all of the
tools available on the program so just
if you don't want to deal with it and
it's a pain in the butt just going to
close down the antivirus download the
torrent of katana at hack from a cave .
com and this is the hack from a cave .
com website right here it's a hefty four
gigs big so make sure you have tons of
room and an eight gig flash drive for
the install
make sure you extract the dark rawr to
the root of your USB stick and then open
the flash drive minus katana d folder
open the root of your flashdrive open
the boot folder right here and right
click on boot ins . that the batch file
and choose run as an administrator
choose that going to try again and it
tells me it's ready to go
press any key to continue continue
setting up boot 4d please wait
read the information above ok should be
beautiful nail installation finished
okay so I exit that and it should be
ready to go it's really really easy to
install katana it really is now you have
two things that you can do first of all
when you started up you can check out
the katana toolkit on your Windows
machine this application can run various
tools such as keepass and unstoppable
copier second you can boot up katana
onto the boot disk on your USB flash
drive so I'm going to do that right now
and here's the restart
restarting so the first thing you need
to do is unplug your drive power down
your computer and then plug the flash
drive back in and you boot from it for
my computer i have to press f12 to boot
into anything other than the usual
windows hard drive go down the USB HDD
sandisk my lovely USB flash drive that's
like huge it's awesome if it works and
it should you'll see the screen that I
have up here
katana with a nice little katana sword
going across you can use your arrow keys
to navigate up and down throughout the
various tools so i'll go down to one of
my favorites i'm going to boot into
ophcrack graphic mode
ophcrack is a really good tool for your
really forgetful siblings whenever they
lose their windows passwords it's
happened to me before it has a built-in
rainbow table and it can figure out the
password in a few seconds so when it
starts up i'll be able to show you that
it will take a couple of seconds for it
to read everything and boot up
ok so you don't even have to touch
anything on the machine when you're
running off crack it will basically just
go through these vista free and XP free
small different rainbow tables and
hopefully find your password so for
example up here under NT pad get my
mouse running under NT pad you can see
homegroup user that's me
snubz that's me my password is game the
game that you guys just lost sorry about
that
ophcrack was able to figure out my
really simple password with no problem
letting me back into my computer so
you'll also notice in katana that you'll
have a problem with 64-bit machines
running com boot if this is the case
first open up the boot directory in the
root of the katana drive then copy the
files vessel menu . 32 and chain . c32
from this directory into the system
linux / combo directory you'll have to
go through a process of choosing kombu
then booting the second HDD then going
back into Kentucky
the main menu then you go back into
konbu to select the next HDD choice
hopefully it'll work for myself I
couldn't get it to work
I got all the way to the windows
password screen and it was not able to
figure out my password when I just typed
in a bunch of mumbo-jumbo so hopefully
it enables combo to finally work even
though you might have a 64-bit machine
but maybe you guys will have battled
better luck this is the general idea of
how to get combat to work as well on
iron geeks blog which I mentioned last
week so
hey maybe it will help you guys out i
also got an email from the Creator Ronan
he gave me some really recent tips and
tricks with katanas such as the fact
that you can use the katana toolkit from
a lockdown window system of course you
can write block the katana drive for
cheap using an SD card which sounds
really cool i hope to get the notes on
that one and you can use a live CD to
avoid meaning the access the password
block bios to modify the boot order for
USB to boot
that's really cool Madonna is a very
handy tool for anybody interested in
learning more about security and
penetration testing
it's also a great application to have in
case you ever need any of those tools
available in the toolkit several tools
have been added since the initial
release of katana so I definitely
suggest you guys check out version to
point out you can check out more from
ronen a hack from a cave . com and you
can email me at feedback at HACC five
dollars with your favorite security
tools or boot kits now it's time from
for word from our sponsor
if your systems administrator or a tech
consultant you've got to have your own
side business i doing various remote
support and IT consulting services and
let me tell you it's easier than you
might think to get started the first
step of course is getting the right
domain is trust me running a business as
chmod 755 @ aol.com isn't going to most
professionally showcase your talents
thankfully domain.com as everything you
need to quickly and easily put together
a professional and modern site to
showcase your talents free for the first
30 days domain.com instant website
hosting is the fastest way to get an SEO
friendly pay
that looks great on pc or smartphone
with fully-featured email hosting
starting at just a dollar ninety-nine
there's no reason why you couldn't have
your name at a professional domain when
you're shopping at domain.com for that
perfect domain don't forget you as a
hak5 your are privileged to a sweet
discount use coupon code hak5 for an
additional fifteen percent at checkout
your next big idea starts at domain.com
ok
that just about wraps up this week's
episode of hak5 but before we get going
some great emails texts for the week
right
oh yeah yeah not attacking the last
night of the weak side about those first
off been right
hey hak5 guys regularly at work i use
Firebug an HTTP Fox Firefox add-ons do
you guys recommend any other must have
security testing Firefox add-ons love
the show
keep up the great work did you gotta
have Firebug but you know as much as I
am a chrome puff that loves you know the
Google's Chrome
yeah the inspector and stuff it's not
nearly as full featured as a Firebug so
that anything like I love it there are a
couple others extensions you might want
to get for firefox we've talked about
some of them in the past
some of them are pretty obvious like no
script which is great work by default
turning off javascript on pages or not
just the site so like you're very
example.com and then like example fubar
com has like a script that's embedded it
will prevent that from running and then
like give you the option it will
actually break a lot of pages because
the internet made that way now people
right cool underscored overtime but
don't do this okay good stuff if you're
gonna actually we're gonna go to like a
crack keygen or cereal site like dude do
that in a vm with I mean not that you
would ever go to anything like that in
the same if you were to actually
purchase do that in the vm anyway yeah
um some other said I like though include
there's this one called bad pass Edwards
yeah it will actually as you're typing
your password some sites actually do
this themselves now but as you're typing
a password it will actually show you the
security level of your password
depending on how many characters
Nationals and stuff like that
um exam I bet that's meerut more
accurate than what
normal websites give you know it's funny
because some websites you'll enter in
like a like a 10 character password and
it'll say that's a great password others
are like now that's crap ya know Here I
am i like to use like 50 60 70 character
passwords and then like some banks it's
only like limits you it let me use this
yeah they let me get a 8th or something
like that well yeah i know some that
were Kenny and now I
something like 20 and it's like come on
you know what if i wanted to have like a
4096 character hash remember that
actually probably couldn't remember that
and if you're having a problem with
remembering passwords or you want to
have a different password for every site
like we totally recommend LastPass or
keepass both have ya Firefox extensions
which you should totally check out well
also get on katana keepass oh nice LOL
another one that we've talked about a
little bit kind of like in the periphery
is you know how I'm a big proponent of
using ssh tunneling to you know tunnel
your web traffic while the easiest way
to do that I find with firefox is to use
this plugin called foxy proxy proxy
proxy advise you like right-click and
just say I want to use my proxy and then
you know it just makes it easier than
going through the dialogues and then
last but not least speaking of proxies
and whatnot Fox tour is an extension
that makes it easy to use the tour
service which is the onion router for
anonymizing stuff so that's you know
those are my pics but hey that's not to
say that those are the only in the best
just go ahead and email feedback hak5 .
work with the ones you like that we're
big fans of you know keeping a web
browsing session secure yes release
using disposable vm for when you visit
those sites anyway Jason t rights hide
aaron and shannon Kirby the lovable cat
and mascot and backbone of hak5 while
she's the backpack right i have to agree
well she's a bit of a mystery to the
hak5 viewers at least I think she is if
you could spare a couple of hack five
minutes could we get Kirby story homes
Kirby's master what she likes and
dislikes
Oh Kirby's a curse my kitty it's spelled
with an e once gross there was a kitten
named curvy and she likes hak5 she's a
dude she's a big fan of like she's kind
of a camera or relations yes she likes
to have on-site at random times and I
don't know what holidays
she's coming up on ten September hunt n
and she doesn't look at this little baby
cheers and her biggest thing that she
likes she likes to stand up on her hind
legs do this
it's so cute you are curvy snacks the
little kitty treats and she stands out
like this for anyway we should get too
much into his really inside baseball but
never that's carbon your observation and
yes she's a friend
we love her she's the door go back to
season one crazy shots the Caribbean
season 10 kata I remember that good old
days
ok anyway Francisco writes hi hak5 I've
been meaning to ask this question before
but it goes what kind of upload speeds
do you guys get in the hak5 studio and
to achieve them what kind of hardware
aging your modem load balancer do you
have I run several virtual servers in my
house and the maximum upload speed i can
get is around 100-150 kilobytes per
second
hope that's not a lot what can i do to
increase the upload speeds
thank you in advance right so here at
this studio today we have what is it
could change it so often that we have 2
megabits a second up and actually no I
guess we have more because i'm doing the
speed test right now and I'm getting six
cheese 6.7 yeah so I'm wow I'm getting
closer to seven maybe it's maybe we're
supposed to have five anyway I'm getting
us some damn good upload speeds and
that's because we use a lot like to call
a real router rather than your little
fake plastic box that you get at the
big-box store
seriously if your router in that
language has to kill intent i was going
to say linksys benign economy
well my mom used to have a linksys from
95 and I exchanged it last longer when I
was living at home it wasn't from 95 is
from 2000 because it was where it was
from the nineties gonna be like 90 90 90
i remember was it
it's a she yeah it's Abby router so it's
the wpe 11g I had everyone had dust
bunnies as nobody had touched it so long
it's like now upgrade time I was not
even just about that like sure you can
upgrade it to another plastic router
they sell it like its gaming router and
it's dude seriously a little plastic box
isn't going to compete with the power of
say having a relapse 86 pc and that's
why
well ours is still just like a little
added
maravilla board we love our x86-based
routers I know that well i'm a huge fan
of smooth wall which we have running
here hasn't been updated in awhile
there's also untangled which we've done
stuff on last season and Paul just
recently changed our router which might
be explaining the 6.9 to $OPERAND
megabits a second we got what are you
running now Paul yes he's a fan of cool
he's saying that mono walls like
couldn't get it
blonde isn't yeah I should upgrade from
our neck your router haven't got a
feeling you gotta build a bang router
well it's not like we don't have a
plethora of spare pieces later and no
kidding anyway let us know what your
thoughts are what router to use at home
you know what kind of custom build stuff
do you like maybe there's something
obscure that we haven't heard of ya
test out yeah so I Jeff d Jeff in the
IRC channel is saying right there that
he likes to dd-wrt I like open wrt but
you know that's that's more like
embedded stuff i'm thinking like can you
open your TV on x86 anyway so great
about trucking well before you keep on
rambling let's go on to our technologies
photo of the week I think Darren likes
this one because he has a motorcycle
onset Rollo as he breaks my camera
morbo send us photos of him racing his
motorcycle while sporting his set of
hak5 stickers right there on the tail so
nice
God's beautiful Kentucky cool and
attempt
yes well thank you got about yeah we're
glad you're doing better
Yeah Yeah right did the bike looks great
thanks so much for sending that in yeah
this could actually I've got a clear
class degree right here on my fairing
you see the transparent one I like those
are you know remember that you can
support the show for free and easy you
don't have to stick a hack five stick
around citing a motorcycle I have to do
subscribe on itunes or YouTube or miro
or plethora of other ways that you can
get the show delivered to instantly
every week so you don't have to wait and
it's good
because we like those day 1 download
numbers we got some spanish music going
on outside the windows great but anyway
if you want to support the show in other
ways and stick hak5 stickers on the side
of your car your mom's card whoever's
car you could go over to hack 5 hacks
shop.com to get all of your hak5 goodies
or that already click on storage there
to you can do that tail yeah i just
updated it with a horse on the facebook
and twitter and friendster and all those
other friends staring were not on that
we are on facebook.com slash technol s
twitter.com / back 51 snobs hacked by
Darren at five Paul yep although he
doesn't respond to it now so I do that
for all right that's that's what look i
think a nice so I like there's a crazy
movie like I should have a . with me
hang alright next we're gonna miss it
this place in the the sirens going by
and the the
turn to find a pc way to say anything
like that this is the taco truck
alright until next time guys I'm Shannon
I'm Darren and trust your technical list
all right I'm out here
yeah watch the cameras please I'm gonna
get some joke
winrar or webinars will be featured on a
future episode of hackintosh 57 zip the
cupcake clap that makes sense

Video Length: 38:25
Uploaded By: Hak5
View Count: 99,566

Related Software Products
Windows Keylogger
Windows Keylogger

Published By:
skype-record.com

Description:
Windows Keylogger is one of the most famous monitor software in the world. It is widely used for parental control, employee monitoring and private detective service. By using Windows Keylogger, you can effortlessly know the truth of who is doing what, It monitors instant messages, emails, websites, internet activities, facebook and twitter, pictures, keystrokes, programs, CD-Rom, documents and files, USB drives, printers, clipboard, any website they visited, any program they run, any character ...


Related Videos
How To Make A Keylogger
How To Make A Keylogger

Learn how to make a 360 video camera! https://www.youtube.com/watch?v=KSRaU9MHVVg -~-~~-~~~-~~-~- This video shows you the basics of making a Python Keylogger. You can find the sourcecode here: http://www.tinkernut.com/forum/video-tutorial-help/how-to-make-a-keylogger hr / bClosed Caption:/b yeah key logging what is a method of recording a computer's he strokes for later review there can be both software and ...
Video Length: 05:28
Uploaded By: Tinkernut
View Count: 699,091

How To Make A Simple Python Keylogger
How To Make A Simple Python Keylogger

Learn how to make a 360 video camera! https://www.youtube.com/watch?v=KSRaU9MHVVg -~-~~-~~~-~~-~- Python is a really easy programming language for beginners. What better way to showcase it's range of abilities than making a simple keylogger. hr / bClosed Caption:/b the art of programming the ability to regurgitate commands in order to will the power of these bit and byte behemoths to obey our bidding like this tasty ...
Video Length: 05:10
Uploaded By: Tinkernut
View Count: 660,099

Elite Keylogger - Best keylogger software available! Free Download.
Elite Keylogger - Best keylogger software available! Free Download.

http://www.elite-keylogger.net - Elite Keylogger for Windows - To get 10% OFF Use "EKCNP-DST1" coupon code. http://www.elite-keylogger.net/elite-... - Elite Keylogger for Mac OS X - Download for FREE Elite Keylogger - simply the best key logger on the net! Track chats, passwords, keyboard keystrokes easily in 3 clicks! - Invisible; - 7-day free trial; - application monitoring; - clipboard Monitoring; - multiple log delivery options; - ...
Video Length: 02:17
Uploaded By: TheKeyloggers
View Count: 408,205

Kali Linux (Metasploit) - Creating a Backdoor Undetectable by Antivirus + Keylogger
Kali Linux (Metasploit) - Creating a Backdoor Undetectable by Antivirus + Keylogger

Leave Comments Below if u face any Problem. email - programmedhackers@gmail.com Visit :- Facebook - https://www.facebook.com/programmedhackers Blogger - programmedhackers.blogspot.com Twitter - https://twitter.com/Progrmd_Hackers
Video Length: 05:42
Uploaded By: Programmed Hackers
View Count: 146,786

How to Install A Free Keylogger (Tutorial) Commentary
How to Install A Free Keylogger (Tutorial) Commentary

How to install a keylogger and log the keystrokes of a computer. A hacking tutorial teaching you how you can protect yourself from unwanted users and persecute them. This software is great if you want to record any information or actions performed on your computer. The software is from Phrozen Soft and can be downloaded for Free here: http://phrozensoft.com/downloads.ps It can also be installed and access across the internet via proxy. If you ...
Video Length: 04:40
Uploaded By: RealiseHow.com
View Count: 135,332

Kako "hakovati" facebook (keylogger)
Kako "hakovati" facebook (keylogger)

https://www.facebook.com/SrpskiTutorijali http://download.cnet.com/Keylogger-Free/3000-2162_4-75951688.html?tag=mncol;2
Video Length: 03:34
Uploaded By: Srpski Tutorijali
View Count: 107,444

How to make an Email Sending Keylogger In Visual Basic 2010
How to make an Email Sending Keylogger In Visual Basic 2010

If you have any comments/questions post below (update) Here is a working code to make the keylogger startup with windows: Dim appname As String = IO.Path.GetFileName(Application.ExecutablePath) My.Computer.FileSystem.CopyFile(Application.ExecutablePath, "C:\ProgramData\status\" & "Status.EXE", True) Dim regKey As Microsoft.Win32.RegistryKey regKey = ...
Video Length: 08:45
Uploaded By: tyler8865
View Count: 76,368

How to Remove a Keylogger Step By Step
How to Remove a Keylogger Step By Step

How to remove a keylogger STEP BY STEP
Video Length: 08:23
Uploaded By: theryanabee
View Count: 76,161

How to Check if you have a KeyLogger [Win7]
How to Check if you have a KeyLogger [Win7]

[ How to Check if you have a KeyLogger ] -- NOTICE -- If you have two winlogons then that means Watch the rest of the video :) Don't END the processes on the winlogins. Restore your computer to factory settings instead. Song: Hoodie Allen [ Faith in Brooklyn ] Song Creator: http://www.youtube.com/user/wearehoodie Steps: 1. Do CTRL + ALT + DEL 2. Click on task Manager 3. Go under processes 4. And check ...
Video Length: 03:35
Uploaded By: ResidentTurorials
View Count: 75,731

Copyright © 2025, Ivertech. All rights reserved.