Shannon shows us how to root her mac in under 10 seconds and Darren continues the WiFi Pineapple drone proof of concept, All that and more this time on Hak5!

Download HD | Download MP4

Youtube Hak5 1521.1:
Youtube Hak5 1521.2:

Shannon Morse shows us how to root her mac in under 10 seconds with a USB Rubber Ducky and a simple script from Patrick Mosca’s article.

Darren continues the WiFi Pineapple drone proof of concept with your feedback and upcoming open source autonomous aerial pwnage platforms. Plus, the Hak5 Drone Pwner at CCC! article.

Leave a Reply

Your email address will not be published. Required fields are marked *



  • Joseph Dickson 1 year ago

    Wow, all the more reason to be paranoid and encrypt my systems.

  • cprogrmmr 1 year ago

    Could someone please update the Threatwire RSS Feed, so that I can watch on my TV? The only Threatwire feed available ends with the Nov. 2, 2013 episode, which obviously isn’t the last produced.

  • Jack K. 1 year ago

    My life as a Wi-Fi Pineapple Pioneer by Darren Kitchen

    Hi Darren,
    Do not let the minor set backs stop you. Look at what people in the past went through. Like Thomas Edison, Nikola Tesla, the Right brothers Orville and Wilbur that gave us modern aviation. Need I go on?

    The basic principle of science is experiment and observation. And good old trial and error. Or oops that did not work. Just learn from it ( this is where observation comes in ) and move forward. When you video the trail and post it on the Internet now the whole world can see the error. Just hope that others can learn from it.

    You are the only one doing this kind of work. Just keep up the Pioneering spirit. The “pay” you get is being mention at CCC 30 by Piotr Esden . Use that “pay” to finance you future endeavors.

  • Quade1492 1 year ago

    For the Apple root exploit another way to mitigate this kind of attack is to enable the EFI firmware password on the Mac. This will prompt for a password anytime you try to boot from anything other than the default boot device (internal hard drive usually). Or enable the EFI firmware and encrypt your drive to be doubly safe!

    Love the show! Keep up the great work!

  • You can also use a firmware password for your Mac and this will prevent any type of unwanted physical access. For example, you will be prompt to enter the firmware password before you can boot in single-user mode or boot from a USB devices or DVDs etc and of course Recovery Mode too.. It is by far the type of protection needed to deal with all physical access trouble and hack :)

  • Awake31337 1 year ago

    Apple Certified Macintosh Technician here.. I have watched this show for years and for the Apple haters, I used to hate Apple too.. until they started paying me :-) but honestly, here’s why I love Macs: 1. UNIX built in. 2. Hard drives… You can boot from a hard drive from another Mac, from an external hdd, and partitioning is very easy and built in to os x. 3. Designed by a hacker (Wozniak). Oh and as for the Firmware passwords / FileVault.. on some MacBook Pros, it’s as easy as removing one of the ram sticks to bypass a firmware password. There’s other ways I shouldn’t speak about. Let’s just say it’s certain key combinations..

  • Initial chromecast testing has revealed that it is a DIAL device and sniffing shows several interesting commands that can be sent to it.

  • Noqturnal 1 year ago

    I was going to take a look at the ducky script, but when I click on “Patrick Mosca’s” article I get a 404

  • Hey Darren, why not setup a Mobile VPN Connection? I know with a device in the air, if the VPN has any issues you’re drone drops. My first thought was for you to setup a Cisco ASA Firewall, then purchase a Cisco AnyConnect Mobile license, launch the app, and voila, over 4G you are connected to the VPN back to your hub site. The idea is that you could fly a drone from the other side of the world.

    Love the show,
    Joe USMC

  • Mark Raft 1 year ago

    Anyone know how to repair a root exploitation on a Mac Book Air? I’ve tried everything, including installing Linux across the entire drive, never mind the potential problems with the boot-loader. I’m resigned to use a ‘Liberte USB’ stick just to use a word processor — my fingers are still crossed. Help!

  • Very nice post. I just stumbled upon your blog and wanted to say that
    I have truly enjoyed surfing around your blog
    posts. After all I’ll be subscribing to your feed and I hope you
    write again very soon!

  • hey there and thank you for your info – I’ve
    definitely picked up anything new from right here. I did however expertise
    a few technical issues using this site, since I experienced to
    reload the web site a lot of times previous to I could get
    it to load properly. I had been wondering if your web hosting is OK?
    Not that I am complaining, but sluggish loading instances times
    will sometimes affect your placement in google and can damage your high-quality score if advertising and marketing with Adwords.

    Well I’m adding this RSS to my e-mail and can look out
    for a lot more of your respective interesting content.
    Make sure you update this again soon.

  • No OSHA Compliance : Even before the Zombie Apocalypse , the Ishimura
    isn’t exactly the safest place in the universe.

  • No fax payday advances have transformed short term personal loan landscape completely
    mulberry wallet cyber monday 2014 you also can hire a professional credit restoration firm to execute the credit dispute process in your behalf nevertheless it is not required.

  • My family members every time say that I am wasting my time here at
    web, except I know I am getting know-how daily by reading such pleasant

  • Icouldn’t refrain from commenting. Exceptionally well written!