Prt.1 – Hak5 Cloud C2 Setup on AWS
What is Cloud C2? Cloud C2 makes it easy for penetration testers and IT security teams to deploy and manage Hak5 gear from a simple self-hosted cloud managed platform. Cloud C2 allows you to maintain

Search for a command to run...
Series
Cybersecurity Topics
What is Cloud C2? Cloud C2 makes it easy for penetration testers and IT security teams to deploy and manage Hak5 gear from a simple self-hosted cloud managed platform. Cloud C2 allows you to maintain

What is CyberChef? CyberChef is a simple, intuitive web application for analyzing and decoding data without having to deal with complex tools or programming languages. It is also known as the “Cyber

What is Shodan: Shodan is a search engine that allows researchers to explore and discover a wide range of devices that are connected to the internet, where they are located and who is using them. Shod

In today’s cyber landscape threats are evolving on a daily basis. There are many ways to reduce your company’s attack surface. A simple way to reduce a company’s email attack surface is by blocking

MouseJack Setup This blog will focus on setting up MouseJack on the Crazyradio by flashing the firmware. Inorder to do this follow the steps below. The hardware required is a Crazy Radio – \(28 - \)3

What is MouseJacking? MouseJack is a class of vulnerabilities that affects the vast majority of wireless, non-Bluetooth keyboards and mice (Bastille, 2016). These peripherals are 'connected' to a host
