Prt.1 โ Hak5 Cloud C2 Setup on AWSWhat is Cloud C2? Cloud C2 makes it easy for penetration testers and IT security teams to deploy and manage Hak5 gear from a simple self-hosted cloud managed platform. Cloud C2 allows you to maintain Nov 22, 2020ยท5 min readยท7
Prt.2 โ How to Setup MouseJack and JackIt!MouseJack Setup This blog will focus on setting up MouseJack on the Crazyradio by flashing the firmware.ย Inorder to do this follow the steps below. The hardware required is a Crazy Radio โ \(28 - \)3Apr 19, 2019ยท2 min readยท9
Prt.1 โ MouseJacking is a Dangerous Threat if your Wireless Peripherals are Vulnerable!What is MouseJacking? MouseJack is a class of vulnerabilities that affects the vast majority of wireless, non-Bluetooth keyboards and mice (Bastille, 2016). These peripherals are 'connected' to a hostApr 15, 2019ยท2 min readยท6