Details

Shannon shows us how to root her mac in under 10 seconds and Darren continues the WiFi Pineapple drone proof of concept, All that and more this time on Hak5!

Download HD Download MP4

Shannon Morse shows us how to root her mac in under 10 seconds with a USB Rubber Ducky and a simple script from Patrick Mosca’s article.

Darren continues the WiFi Pineapple drone proof of concept with your feedback and upcoming open source autonomous aerial pwnage platforms. Plus, the Hak5 Drone Pwner at CCC!

Leave a Reply

Your email address will not be published. Required fields are marked *

*

10 Comments

  • Joseph Dickson 7 months ago

    Wow, all the more reason to be paranoid and encrypt my systems.

  • cprogrmmr 7 months ago

    Could someone please update the Threatwire RSS Feed, so that I can watch on my TV? The only Threatwire feed available ends with the Nov. 2, 2013 episode, which obviously isn’t the last produced.

  • Jack K. 7 months ago

    My life as a Wi-Fi Pineapple Pioneer by Darren Kitchen

    Hi Darren,
    Do not let the minor set backs stop you. Look at what people in the past went through. Like Thomas Edison, Nikola Tesla, the Right brothers Orville and Wilbur that gave us modern aviation. Need I go on?

    The basic principle of science is experiment and observation. And good old trial and error. Or oops that did not work. Just learn from it ( this is where observation comes in ) and move forward. When you video the trail and post it on the Internet now the whole world can see the error. Just hope that others can learn from it.

    You are the only one doing this kind of work. Just keep up the Pioneering spirit. The “pay” you get is being mention at CCC 30 by Piotr Esden . Use that “pay” to finance you future endeavors.

  • Quade1492 7 months ago

    For the Apple root exploit another way to mitigate this kind of attack is to enable the EFI firmware password on the Mac. This will prompt for a password anytime you try to boot from anything other than the default boot device (internal hard drive usually). Or enable the EFI firmware and encrypt your drive to be doubly safe!

    Love the show! Keep up the great work!

  • You can also use a firmware password for your Mac and this will prevent any type of unwanted physical access. For example, you will be prompt to enter the firmware password before you can boot in single-user mode or boot from a USB devices or DVDs etc and of course Recovery Mode too.. It is by far the type of protection needed to deal with all physical access trouble and hack :)

  • Awake31337 7 months ago

    Apple Certified Macintosh Technician here.. I have watched this show for years and for the Apple haters, I used to hate Apple too.. until they started paying me :-) but honestly, here’s why I love Macs: 1. UNIX built in. 2. Hard drives… You can boot from a hard drive from another Mac, from an external hdd, and partitioning is very easy and built in to os x. 3. Designed by a hacker (Wozniak). Oh and as for the Firmware passwords / FileVault.. on some MacBook Pros, it’s as easy as removing one of the ram sticks to bypass a firmware password. There’s other ways I shouldn’t speak about. Let’s just say it’s certain key combinations..

  • Initial chromecast testing has revealed that it is a DIAL device and sniffing shows several interesting commands that can be sent to it.

  • Noqturnal 7 months ago

    I was going to take a look at the ducky script, but when I click on “Patrick Mosca’s” article I get a 404

  • Hey Darren, why not setup a Mobile VPN Connection? I know with a device in the air, if the VPN has any issues you’re drone drops. My first thought was for you to setup a Cisco ASA Firewall, then purchase a Cisco AnyConnect Mobile license, launch the app, and voila, over 4G you are connected to the VPN back to your hub site. The idea is that you could fly a drone from the other side of the world.

    Love the show,
    Joe USMC

  • Mark Raft 3 months ago

    Anyone know how to repair a root exploitation on a Mac Book Air? I’ve tried everything, including installing Linux across the entire drive, never mind the potential problems with the boot-loader. I’m resigned to use a ‘Liberte USB’ stick just to use a word processor — my fingers are still crossed. Help!