SlideShare a Scribd company logo
1 of 36
Insert Your Name
Insert Your Title
Insert Date
New World ā€“ New Security
BYODā€¦. & some cool h@ck1ng gadgets / toolsā€¦.
Roy Gray
CISSP-CCIE-CCNA-CEH-CHFI
roy.gray@safenet-inc.com
Ā© SafeNet Confidential and Proprietary
2Ā© SafeNet Confidential and Proprietary
Who We Are
Trusted to protect the worldā€™s most sensitive data for
the worldā€™s most trusted brands.
We protect the most
money that moves in
the world, $1 trillion
daily.
We protect the most digital
identities in the world.
We protect the most
classified information
in the world.
FOUNDED
1983
REVENUE
~500m
EMPLOYEES
+1,500
In 25 countries
OWENERSHIP
Private
GLOBAL FOOTPRINT
+25,000
Customers in
100 countries
ACCREDITED
Products certified
to the highest
security standard
3Ā© SafeNet Confidential and Proprietary
-Disclaimer
-Local Laws
-USB HID Device
-Cool Wi-Fi story
-Wi-Fi MITM Experimentā€¦.Want to take part?
-Example ā€•crackingā€– sites
-Cain & Able ARP MITMA
-Cain & Able Brute Force
-Cain & Able R$A Calculator
-OPH Rainbow tables
4Ā© SafeNet Confidential and Proprietary
Legal Disclaimer
Hacking without permission may result
in a prison sentence ā€“ do not try any of
these techniques at home
*See Hacking Lawā€™s from CEH*
Do send me a postcard
though and tell me which one
you used!
5Ā© SafeNet Confidential and Proprietary
6Ā© SafeNet Confidential and Proprietary
+
USB HID- Scripting 101
7Ā© SafeNet Confidential and Proprietary
As Storage
As Keyboard
8Ā© SafeNet Confidential and Proprietary
Script Encode Payload
USB HID- Keyboard Scripting For Fun
9Ā© SafeNet Confidential and Proprietary
USB HID- Keyboard Scripting Not For Fun
Script Encode Payload
10Ā© SafeNet Confidential and Proprietary
USB HID- Keyboard Scripting Not For Fun
11Ā© SafeNet Confidential and Proprietary
Imagine you are Chuck, a Wi-Fi penetration tester at
ACME Corp., sitting at the cafeteria. Busy office workers that
BYOD, are eating, socializing and using the Internet from their
laptops, smartphones and tablets.
Alice is sitting across from you pulling a tablet from her purse.
She intends to connect to the wireless, and surf
during lunch. The tablet, waking up, transmits Wi-Fi probe
requests looking for preferred networks.
12Ā© SafeNet Confidential and Proprietary
Since Alice has connected to ACME Corp. wireless from her tablet
in the past it remembers the network name (SSID) and looks
for it periodically in this fashion. If the network is
within range it will receive a probe response to its probe
request.
The probe responses provides Aliceā€™s tablet with
the necessary information it needs to associate with ACME Corp.
network. Since this process happens automatically for every
network Alice frequently connects to, both on her tablet and
laptop she isnā€™t inconvenienced by choice when getting online
at the office, home, cafes or even airplanes!
Probe responses
Probe requests
13Ā© SafeNet Confidential and Proprietary
Chuck (thatā€™s you!) has a Wi-Fi Pen testing device in his bag.
The device is constantly listening for probes requests.
When it hears the probe request for the ACME Corp. network
from Aliceā€™s tablet it responds with an appropriately crafted
probe response. This informs Aliceā€™s tablet that the device
is in fact the ACME Corp. wireless network.
Of course this is a lie that Aliceā€™s tablet will believe.
This simple yet effective lie is responsible for the
deviceā€™s code name ā€•Jasagerā€– ā€“German for
ā€•The Yes Sayerā€– or ā€•The Yes Manā€–.
14Ā© SafeNet Confidential and Proprietary
Once Aliceā€™s tablet receives the probe response from Chuckā€™s
device they begin the process of associating, and within
moments her tablet has obtained an IP address this the
Pen test deviceā€™s DHCP server. The Pen test deviceā€™s DHCP
server provides Aliceā€™s tablet with not only an IP address, but
DNS and routing information necessary to get her online.
Chuck has the Pen test device ā€•dialled-upā€– to the internet via a
pre -configured USB Modem, the default gateway used by
Aliceā€™s tablet will be the IP of the Pen test device.
Probe responses
Probe requests
15Ā© SafeNet Confidential and Proprietary
Now that Chuckā€™s internet enabled device has made
friends with Aliceā€™s tablet she is free to browse the
web and Chuck is free to eavesdrop and even
change the web she sees.
Using man in the middle tools, Chuck is able to
watch what web sites Alice visits (url snarf).
Since Chuck is particularly mischievous he prefers
to change what servers Alice connects to when
looking up a website (dns spoof)ā€”thus replacing
would be kitten videos with ones of puppies. Oh the
horrors!...
16Ā© SafeNet Confidential and Proprietary
Chuck is even capable of saving Aliceā€™s browsing
sessions to disk for later analysis
(tcpdump), intercept secure communications
(sslstrip), or inject malicious code on to websites
(ettercap-ng).
Alternatively if Chuck chooses not to provide
internet access at all the device will still be an
effective wireless auditing tool.
By enabling DNS spoof Chuck is able to redirect
Aliceā€™s browsing session from legitimate websites to
the deviceā€™s built in web server, which may host a
number of phishing sites, password harvesting or
malware.
17Ā© SafeNet Confidential and Proprietary
Since Chuck canā€™t stay at the ACME Corp. cafeteria
all day, he considers leaving his device on site. The
device is concealed in a case with a battery
pack, hidden in plain sight.
18Ā© SafeNet Confidential and Proprietary
In this case Chuck is able to remotely manage the
device a few ways. If no internet access is being
provided Chuck must be within range of the device
wireless network in order to connect to the
management SSID.
If internet access is provided, Chuck can configure
a persistent SSH tunnel. With an SSH or VPN
tunnel enabled, internet traffic from the device
connected client routes through the tunnel endpoint
ā€“ typically a virtual private server. From this VPS
Chuck may also extend the man in the middle
attack.
19Ā© SafeNet Confidential and Proprietary
www
Probe requests
Proberequests
20
Wi-Fi MITM Experiment : mk4 karma, urlsnarf, dns spoof , facebook/twitter phishing
phishing site
21
Cell phone tracking deviceā€¦.send picā€¦see gps,txt,calls,emailā€¦.
22Ā© SafeNet Confidential and Proprietary
Hacking Gadgetsā€¦..who needs themā€¦.when..
23Ā© SafeNet Confidential and Proprietary
Hacking Gadgetsā€¦..who needs themā€¦.when..
24Ā© SafeNet Confidential and Proprietary
Hacking Gadgetsā€¦..who needs themā€¦.when..
25Ā© SafeNet Confidential and Proprietary
The Weapons ā€“ Hands On
Cain & Abel is a password recovery tool for Microsoft Operating
Systems.
It allows easy recovery of various kind of passwords by:
-Sniffing the network
-Cracking encrypted passwords using Dictionary
-Brute-Force and Cryptanalysis attacks
-Recording VoIP conversations
-Decoding scrambled passwords
-Recovering wireless network keys
-Revealing password boxes
-Uncovering cached passwords
-Analyzing routing protocolsā€¦.and more.
26Ā© SafeNet Confidential and Proprietary
Cain & Abel has been developed in the hope that it will be useful for
network administrators, teachers, security consultants/professionals,
forensic staff, security software vendors, professional penetration tester
and everyone else that plans to use it for ethical reasons.
The latest version is faster and contains a lot of new features like
APR (Arp Poison Routing) which enables sniffing on switched LANs
and Man-in-the-Middle attacks.
The sniffer in this version can also analyze encrypted protocols such
as SSH-1 and HTTPS, and contains filters to capture credentials from a
wide range of authentication mechanisms.
The new version also includes routing protocols authentication monitors &
routes extractors, dictionary & brute-force crackers for all common
hashing algorithms & for several specific authentications,
password/hash calculators, cryptanalysis attacks, password decoders
& some not so common utilities related to network and system security.
The Weapons ā€“ Hands On
27Ā© SafeNet Confidential and Proprietary
-Added support for Windows 2008 Terminal Server in APR-RDP sniffer filter.
- Added Abel64.exe and Abel64.dll to support hashes extraction on x64 OS.
- Added x64 operating systems support in NTLM hashes Dumper,
MS-CACHE hashes Dumper, LSA Secrets Dumper, Wireless Password Decoder,
Credential Manager Password Decoder, DialUp Password Decoder.
- Added Windows Live Mail (Windows 7) Password Decoder for POP3, IMAP, NNTP,
SMTP and LDAP accounts.
- Fixed a bug of RSA SecurID Calculator within XML import function.
- Fixed a bug in all APR-SSL based sniffer filters to avoid 100% CPU
utilization while forwarding data.
- Executables rebuilt with Visual Studio 2008.
**Be very aware of versions with screenscrape / backdoors, not downloaded from the correct source.
The Weapons ā€“ Hands On
28Ā© SafeNet Confidential and Proprietary
ARP Poison
Select interface - Scan for hosts - Poison ARP Table - Look for PWā€™s
Brute Force
R$A Calculatorā€¦and more
Lets take it for a ā€•Test Driveā€–
Industry
Example:
The Weapons ā€“ Hands On
29Ā© SafeNet Confidential and Proprietary
Ophcrack is an open source (GPL licensed) program that cracks Windows passwords
by using LM hashes through rainbow tables. The program includes the ability to import
the hashes from a variety of formats, including dumping directly from the SAM files of
Windows. It is claimed that these tables can crack 99.9% of alphanumeric passwords
of up to 14 characters in usually a few minutes.
A rainbow table is a lookup table offering a time-memory tradeoff used in recovering
the plaintext password from a password hash generated by a hash function, often a
cryptographic hash function. A common application is to make attacks against hashed
passwords feasible.
The Weapons ā€“ Hands On
30Ā© SafeNet Confidential and Proprietary
XP Rainbow Tables Example:
The Weapons ā€“ Hands On
31Ā© SafeNet Confidential and Proprietary
Vista / Win 7 Rainbow Tables Example:
The Weapons ā€“ Hands On
32Ā© SafeNet Confidential and Proprietary
Example using a XP VM
Length = 14
Predefined Charset :
Base64 = Decimal + Lowercase + Uppercase + Special Characters
< 4min
CRACKED!
The Weapons ā€“ Hands On
33Ā© SafeNet Confidential and Proprietary
Lets take it for a ā€•Test Driveā€–
In Under 4min
The Weapons ā€“ Hands On
34Ā© SafeNet Confidential and Proprietary
CAIN vs OPHCRACK
The Weapons ā€“ Hands On
35Ā© SafeNet Confidential and Proprietary
CAIN vs OPHCRACK
The Weapons ā€“ Hands On
36Ā© SafeNet Confidential and Proprietary

More Related Content

What's hot

[2.2] Hacking Internet of Things devices - Ivan Novikov
[2.2] Hacking Internet of Things devices - Ivan Novikov[2.2] Hacking Internet of Things devices - Ivan Novikov
[2.2] Hacking Internet of Things devices - Ivan NovikovOWASP Russia
Ā 
Exploiting WiFi Security
Exploiting WiFi Security Exploiting WiFi Security
Exploiting WiFi Security Hariraj Rathod
Ā 
Network Security fundamentals
Network Security fundamentalsNetwork Security fundamentals
Network Security fundamentalsTariq kanher
Ā 
Reconnaissance & Scanning
Reconnaissance & ScanningReconnaissance & Scanning
Reconnaissance & Scanningamiable_indian
Ā 
Threat Con 2021: What's Hitting my Honeypots
Threat Con 2021: What's Hitting my HoneypotsThreat Con 2021: What's Hitting my Honeypots
Threat Con 2021: What's Hitting my HoneypotsAPNIC
Ā 
Ceh v8 labs module 15 hacking wireless networks
Ceh v8 labs module 15 hacking wireless networksCeh v8 labs module 15 hacking wireless networks
Ceh v8 labs module 15 hacking wireless networksMehrdad Jingoism
Ā 
The Top 10/20 Internet Security Vulnerabilities ā€“ A Primer
The Top 10/20 Internet Security Vulnerabilities ā€“ A PrimerThe Top 10/20 Internet Security Vulnerabilities ā€“ A Primer
The Top 10/20 Internet Security Vulnerabilities ā€“ A Primeramiable_indian
Ā 
The state of wireless security
The state of wireless security The state of wireless security
The state of wireless security Filip Waeytens
Ā 
ŠšŃ€ŠøтŠøчŠµŃŠŗŠø Š¾ŠæŠ°ŃŠ½Ń‹Šµ уяŠ·Š²ŠøŠ¼Š¾ŃŃ‚Šø Š² ŠæŠ¾ŠæуŠ»ŃŃ€Š½Ń‹Ń… 3G- Šø 4G-Š¼Š¾Š“ŠµŠ¼Š°Ń… ŠøŠ»Šø ŠŗŠ°Šŗ ŠæŠ¾ŃŃ‚Ń€Š¾Šøть...
ŠšŃ€ŠøтŠøчŠµŃŠŗŠø Š¾ŠæŠ°ŃŠ½Ń‹Šµ уяŠ·Š²ŠøŠ¼Š¾ŃŃ‚Šø Š² ŠæŠ¾ŠæуŠ»ŃŃ€Š½Ń‹Ń… 3G- Šø 4G-Š¼Š¾Š“ŠµŠ¼Š°Ń… ŠøŠ»Šø ŠŗŠ°Šŗ ŠæŠ¾ŃŃ‚Ń€Š¾Šøть...ŠšŃ€ŠøтŠøчŠµŃŠŗŠø Š¾ŠæŠ°ŃŠ½Ń‹Šµ уяŠ·Š²ŠøŠ¼Š¾ŃŃ‚Šø Š² ŠæŠ¾ŠæуŠ»ŃŃ€Š½Ń‹Ń… 3G- Šø 4G-Š¼Š¾Š“ŠµŠ¼Š°Ń… ŠøŠ»Šø ŠŗŠ°Šŗ ŠæŠ¾ŃŃ‚Ń€Š¾Šøть...
ŠšŃ€ŠøтŠøчŠµŃŠŗŠø Š¾ŠæŠ°ŃŠ½Ń‹Šµ уяŠ·Š²ŠøŠ¼Š¾ŃŃ‚Šø Š² ŠæŠ¾ŠæуŠ»ŃŃ€Š½Ń‹Ń… 3G- Šø 4G-Š¼Š¾Š“ŠµŠ¼Š°Ń… ŠøŠ»Šø ŠŗŠ°Šŗ ŠæŠ¾ŃŃ‚Ń€Š¾Šøть...Positive Hack Days
Ā 
Bh fed-03-kaminsky
Bh fed-03-kaminskyBh fed-03-kaminsky
Bh fed-03-kaminskyDan Kaminsky
Ā 
Kipp Berdiansky on Tcp syn flooding and ip spoofing attacks
Kipp Berdiansky on Tcp syn flooding and ip spoofing attacksKipp Berdiansky on Tcp syn flooding and ip spoofing attacks
Kipp Berdiansky on Tcp syn flooding and ip spoofing attacksKipp Berdiansky
Ā 
Hack wifi password using kali linux
Hack wifi password using kali linuxHack wifi password using kali linux
Hack wifi password using kali linuxHelder Oliveira
Ā 
Open vpn feature_on_yealink_ip_phones_v80_60(1)
Open vpn feature_on_yealink_ip_phones_v80_60(1)Open vpn feature_on_yealink_ip_phones_v80_60(1)
Open vpn feature_on_yealink_ip_phones_v80_60(1)maunicmer
Ā 
How Hack WiFi through Aircrack-ng in Kali Linux Cyber Security
How Hack WiFi through Aircrack-ng in Kali Linux Cyber SecurityHow Hack WiFi through Aircrack-ng in Kali Linux Cyber Security
How Hack WiFi through Aircrack-ng in Kali Linux Cyber SecurityAhmad Yar
Ā 
An Approach to for Improving the Efficiency of IDS System Using Honeypot
An Approach to for Improving the Efficiency of IDS System Using HoneypotAn Approach to for Improving the Efficiency of IDS System Using Honeypot
An Approach to for Improving the Efficiency of IDS System Using HoneypotEditor Jacotech
Ā 

What's hot (19)

[2.2] Hacking Internet of Things devices - Ivan Novikov
[2.2] Hacking Internet of Things devices - Ivan Novikov[2.2] Hacking Internet of Things devices - Ivan Novikov
[2.2] Hacking Internet of Things devices - Ivan Novikov
Ā 
Exploiting WiFi Security
Exploiting WiFi Security Exploiting WiFi Security
Exploiting WiFi Security
Ā 
Network Security fundamentals
Network Security fundamentalsNetwork Security fundamentals
Network Security fundamentals
Ā 
Wireless security
Wireless securityWireless security
Wireless security
Ā 
Reconnaissance & Scanning
Reconnaissance & ScanningReconnaissance & Scanning
Reconnaissance & Scanning
Ā 
Threat Con 2021: What's Hitting my Honeypots
Threat Con 2021: What's Hitting my HoneypotsThreat Con 2021: What's Hitting my Honeypots
Threat Con 2021: What's Hitting my Honeypots
Ā 
Ceh v8 labs module 15 hacking wireless networks
Ceh v8 labs module 15 hacking wireless networksCeh v8 labs module 15 hacking wireless networks
Ceh v8 labs module 15 hacking wireless networks
Ā 
The Top 10/20 Internet Security Vulnerabilities ā€“ A Primer
The Top 10/20 Internet Security Vulnerabilities ā€“ A PrimerThe Top 10/20 Internet Security Vulnerabilities ā€“ A Primer
The Top 10/20 Internet Security Vulnerabilities ā€“ A Primer
Ā 
Network security
Network securityNetwork security
Network security
Ā 
The state of wireless security
The state of wireless security The state of wireless security
The state of wireless security
Ā 
ŠšŃ€ŠøтŠøчŠµŃŠŗŠø Š¾ŠæŠ°ŃŠ½Ń‹Šµ уяŠ·Š²ŠøŠ¼Š¾ŃŃ‚Šø Š² ŠæŠ¾ŠæуŠ»ŃŃ€Š½Ń‹Ń… 3G- Šø 4G-Š¼Š¾Š“ŠµŠ¼Š°Ń… ŠøŠ»Šø ŠŗŠ°Šŗ ŠæŠ¾ŃŃ‚Ń€Š¾Šøть...
ŠšŃ€ŠøтŠøчŠµŃŠŗŠø Š¾ŠæŠ°ŃŠ½Ń‹Šµ уяŠ·Š²ŠøŠ¼Š¾ŃŃ‚Šø Š² ŠæŠ¾ŠæуŠ»ŃŃ€Š½Ń‹Ń… 3G- Šø 4G-Š¼Š¾Š“ŠµŠ¼Š°Ń… ŠøŠ»Šø ŠŗŠ°Šŗ ŠæŠ¾ŃŃ‚Ń€Š¾Šøть...ŠšŃ€ŠøтŠøчŠµŃŠŗŠø Š¾ŠæŠ°ŃŠ½Ń‹Šµ уяŠ·Š²ŠøŠ¼Š¾ŃŃ‚Šø Š² ŠæŠ¾ŠæуŠ»ŃŃ€Š½Ń‹Ń… 3G- Šø 4G-Š¼Š¾Š“ŠµŠ¼Š°Ń… ŠøŠ»Šø ŠŗŠ°Šŗ ŠæŠ¾ŃŃ‚Ń€Š¾Šøть...
ŠšŃ€ŠøтŠøчŠµŃŠŗŠø Š¾ŠæŠ°ŃŠ½Ń‹Šµ уяŠ·Š²ŠøŠ¼Š¾ŃŃ‚Šø Š² ŠæŠ¾ŠæуŠ»ŃŃ€Š½Ń‹Ń… 3G- Šø 4G-Š¼Š¾Š“ŠµŠ¼Š°Ń… ŠøŠ»Šø ŠŗŠ°Šŗ ŠæŠ¾ŃŃ‚Ń€Š¾Šøть...
Ā 
Bh fed-03-kaminsky
Bh fed-03-kaminskyBh fed-03-kaminsky
Bh fed-03-kaminsky
Ā 
Kipp Berdiansky on Tcp syn flooding and ip spoofing attacks
Kipp Berdiansky on Tcp syn flooding and ip spoofing attacksKipp Berdiansky on Tcp syn flooding and ip spoofing attacks
Kipp Berdiansky on Tcp syn flooding and ip spoofing attacks
Ā 
Hack wifi password using kali linux
Hack wifi password using kali linuxHack wifi password using kali linux
Hack wifi password using kali linux
Ā 
Internet census 2012
Internet census 2012Internet census 2012
Internet census 2012
Ā 
Aircrack
AircrackAircrack
Aircrack
Ā 
Open vpn feature_on_yealink_ip_phones_v80_60(1)
Open vpn feature_on_yealink_ip_phones_v80_60(1)Open vpn feature_on_yealink_ip_phones_v80_60(1)
Open vpn feature_on_yealink_ip_phones_v80_60(1)
Ā 
How Hack WiFi through Aircrack-ng in Kali Linux Cyber Security
How Hack WiFi through Aircrack-ng in Kali Linux Cyber SecurityHow Hack WiFi through Aircrack-ng in Kali Linux Cyber Security
How Hack WiFi through Aircrack-ng in Kali Linux Cyber Security
Ā 
An Approach to for Improving the Efficiency of IDS System Using Honeypot
An Approach to for Improving the Efficiency of IDS System Using HoneypotAn Approach to for Improving the Efficiency of IDS System Using Honeypot
An Approach to for Improving the Efficiency of IDS System Using Honeypot
Ā 

Similar to Holland safenet livehack hid usb pineapple_cain_oph_with_video

DEF CON 23: Internet of Things: Hacking 14 Devices
DEF CON 23: Internet of Things: Hacking 14 DevicesDEF CON 23: Internet of Things: Hacking 14 Devices
DEF CON 23: Internet of Things: Hacking 14 DevicesSynack
Ā 
Security Handbook
 Security Handbook Security Handbook
Security HandbookAnthony Hasse
Ā 
Cisco Connect Halifax 2018 Anatomy of attack
Cisco Connect Halifax 2018   Anatomy of attackCisco Connect Halifax 2018   Anatomy of attack
Cisco Connect Halifax 2018 Anatomy of attackCisco Canada
Ā 
10 Wireless Home Network Security Tips
10 Wireless Home Network Security Tips10 Wireless Home Network Security Tips
10 Wireless Home Network Security TipsPECB
Ā 
FBI & Secret Service- Business Email Compromise Workshop
FBI & Secret Service- Business Email Compromise WorkshopFBI & Secret Service- Business Email Compromise Workshop
FBI & Secret Service- Business Email Compromise WorkshopErnest Staats
Ā 
Comptia Security+ Exam Notes
Comptia Security+ Exam NotesComptia Security+ Exam Notes
Comptia Security+ Exam NotesVijayanand Yadla
Ā 
Securing Network Access with Open Source solutions
Securing Network Access with Open Source solutionsSecuring Network Access with Open Source solutions
Securing Network Access with Open Source solutionsNick Owen
Ā 
Sectools
SectoolsSectools
Sectoolssecuredome
Ā 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Scienceinventy
Ā 
Ending the Tyranny of Expensive Security Tools
Ending the Tyranny of Expensive Security ToolsEnding the Tyranny of Expensive Security Tools
Ending the Tyranny of Expensive Security ToolsSolarWinds
Ā 
Ending the Tyranny of Expensive Security Tools
Ending the Tyranny of Expensive Security ToolsEnding the Tyranny of Expensive Security Tools
Ending the Tyranny of Expensive Security ToolsMichele Chubirka
Ā 
A modern approach to safeguarding your ICS and SCADA systems
A modern approach to safeguarding your ICS and SCADA systemsA modern approach to safeguarding your ICS and SCADA systems
A modern approach to safeguarding your ICS and SCADA systemsAlane Moran
Ā 
Security intermediate practical cryptography_certs_and 802.1_x_rich langston...
Security intermediate  practical cryptography_certs_and 802.1_x_rich langston...Security intermediate  practical cryptography_certs_and 802.1_x_rich langston...
Security intermediate practical cryptography_certs_and 802.1_x_rich langston...Aruba, a Hewlett Packard Enterprise company
Ā 
Wireless Pentesting: It's more than cracking WEP
Wireless Pentesting: It's  more than cracking WEPWireless Pentesting: It's  more than cracking WEP
Wireless Pentesting: It's more than cracking WEPJoe McCray
Ā 

Similar to Holland safenet livehack hid usb pineapple_cain_oph_with_video (20)

DEF CON 23: Internet of Things: Hacking 14 Devices
DEF CON 23: Internet of Things: Hacking 14 DevicesDEF CON 23: Internet of Things: Hacking 14 Devices
DEF CON 23: Internet of Things: Hacking 14 Devices
Ā 
Airheads dallas 2011 wireless security
Airheads dallas 2011   wireless securityAirheads dallas 2011   wireless security
Airheads dallas 2011 wireless security
Ā 
2012 ah vegas wlan security fundamentals
2012 ah vegas   wlan security fundamentals2012 ah vegas   wlan security fundamentals
2012 ah vegas wlan security fundamentals
Ā 
Security Handbook
 Security Handbook Security Handbook
Security Handbook
Ā 
Cisco Connect Halifax 2018 Anatomy of attack
Cisco Connect Halifax 2018   Anatomy of attackCisco Connect Halifax 2018   Anatomy of attack
Cisco Connect Halifax 2018 Anatomy of attack
Ā 
Firewall
FirewallFirewall
Firewall
Ā 
10 Wireless Home Network Security Tips
10 Wireless Home Network Security Tips10 Wireless Home Network Security Tips
10 Wireless Home Network Security Tips
Ā 
FBI & Secret Service- Business Email Compromise Workshop
FBI & Secret Service- Business Email Compromise WorkshopFBI & Secret Service- Business Email Compromise Workshop
FBI & Secret Service- Business Email Compromise Workshop
Ā 
Comptia Security+ Exam Notes
Comptia Security+ Exam NotesComptia Security+ Exam Notes
Comptia Security+ Exam Notes
Ā 
Securing Network Access with Open Source solutions
Securing Network Access with Open Source solutionsSecuring Network Access with Open Source solutions
Securing Network Access with Open Source solutions
Ā 
Sectools
SectoolsSectools
Sectools
Ā 
aaa
aaaaaa
aaa
Ā 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Science
Ā 
Ending the Tyranny of Expensive Security Tools
Ending the Tyranny of Expensive Security ToolsEnding the Tyranny of Expensive Security Tools
Ending the Tyranny of Expensive Security Tools
Ā 
Ending the Tyranny of Expensive Security Tools
Ending the Tyranny of Expensive Security ToolsEnding the Tyranny of Expensive Security Tools
Ending the Tyranny of Expensive Security Tools
Ā 
voip_en
voip_envoip_en
voip_en
Ā 
A modern approach to safeguarding your ICS and SCADA systems
A modern approach to safeguarding your ICS and SCADA systemsA modern approach to safeguarding your ICS and SCADA systems
A modern approach to safeguarding your ICS and SCADA systems
Ā 
Security intermediate practical cryptography_certs_and 802.1_x_rich langston...
Security intermediate  practical cryptography_certs_and 802.1_x_rich langston...Security intermediate  practical cryptography_certs_and 802.1_x_rich langston...
Security intermediate practical cryptography_certs_and 802.1_x_rich langston...
Ā 
Wireless Pentesting: It's more than cracking WEP
Wireless Pentesting: It's  more than cracking WEPWireless Pentesting: It's  more than cracking WEP
Wireless Pentesting: It's more than cracking WEP
Ā 
Wireless hacking
Wireless hackingWireless hacking
Wireless hacking
Ā 

Recently uploaded

FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
Ā 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamUiPathCommunity
Ā 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
Ā 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
Ā 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Christopher Logan Kennedy
Ā 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontologyjohnbeverley2021
Ā 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
Ā 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
Ā 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
Ā 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityWSO2
Ā 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxRemote DBA Services
Ā 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
Ā 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Angeliki Cooney
Ā 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusZilliz
Ā 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
Ā 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
Ā 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
Ā 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
Ā 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
Ā 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vƔzquez
Ā 

Recently uploaded (20)

FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
Ā 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
Ā 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Ā 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Ā 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
Ā 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
Ā 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
Ā 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
Ā 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
Ā 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
Ā 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
Ā 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Ā 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Ā 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
Ā 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Ā 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
Ā 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
Ā 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Ā 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
Ā 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Ā 

Holland safenet livehack hid usb pineapple_cain_oph_with_video

  • 1. Insert Your Name Insert Your Title Insert Date New World ā€“ New Security BYODā€¦. & some cool h@ck1ng gadgets / toolsā€¦. Roy Gray CISSP-CCIE-CCNA-CEH-CHFI roy.gray@safenet-inc.com Ā© SafeNet Confidential and Proprietary
  • 2. 2Ā© SafeNet Confidential and Proprietary Who We Are Trusted to protect the worldā€™s most sensitive data for the worldā€™s most trusted brands. We protect the most money that moves in the world, $1 trillion daily. We protect the most digital identities in the world. We protect the most classified information in the world. FOUNDED 1983 REVENUE ~500m EMPLOYEES +1,500 In 25 countries OWENERSHIP Private GLOBAL FOOTPRINT +25,000 Customers in 100 countries ACCREDITED Products certified to the highest security standard
  • 3. 3Ā© SafeNet Confidential and Proprietary -Disclaimer -Local Laws -USB HID Device -Cool Wi-Fi story -Wi-Fi MITM Experimentā€¦.Want to take part? -Example ā€•crackingā€– sites -Cain & Able ARP MITMA -Cain & Able Brute Force -Cain & Able R$A Calculator -OPH Rainbow tables
  • 4. 4Ā© SafeNet Confidential and Proprietary Legal Disclaimer Hacking without permission may result in a prison sentence ā€“ do not try any of these techniques at home *See Hacking Lawā€™s from CEH* Do send me a postcard though and tell me which one you used!
  • 5. 5Ā© SafeNet Confidential and Proprietary
  • 6. 6Ā© SafeNet Confidential and Proprietary +
  • 7. USB HID- Scripting 101 7Ā© SafeNet Confidential and Proprietary As Storage As Keyboard
  • 8. 8Ā© SafeNet Confidential and Proprietary Script Encode Payload USB HID- Keyboard Scripting For Fun
  • 9. 9Ā© SafeNet Confidential and Proprietary USB HID- Keyboard Scripting Not For Fun Script Encode Payload
  • 10. 10Ā© SafeNet Confidential and Proprietary USB HID- Keyboard Scripting Not For Fun
  • 11. 11Ā© SafeNet Confidential and Proprietary Imagine you are Chuck, a Wi-Fi penetration tester at ACME Corp., sitting at the cafeteria. Busy office workers that BYOD, are eating, socializing and using the Internet from their laptops, smartphones and tablets. Alice is sitting across from you pulling a tablet from her purse. She intends to connect to the wireless, and surf during lunch. The tablet, waking up, transmits Wi-Fi probe requests looking for preferred networks.
  • 12. 12Ā© SafeNet Confidential and Proprietary Since Alice has connected to ACME Corp. wireless from her tablet in the past it remembers the network name (SSID) and looks for it periodically in this fashion. If the network is within range it will receive a probe response to its probe request. The probe responses provides Aliceā€™s tablet with the necessary information it needs to associate with ACME Corp. network. Since this process happens automatically for every network Alice frequently connects to, both on her tablet and laptop she isnā€™t inconvenienced by choice when getting online at the office, home, cafes or even airplanes! Probe responses Probe requests
  • 13. 13Ā© SafeNet Confidential and Proprietary Chuck (thatā€™s you!) has a Wi-Fi Pen testing device in his bag. The device is constantly listening for probes requests. When it hears the probe request for the ACME Corp. network from Aliceā€™s tablet it responds with an appropriately crafted probe response. This informs Aliceā€™s tablet that the device is in fact the ACME Corp. wireless network. Of course this is a lie that Aliceā€™s tablet will believe. This simple yet effective lie is responsible for the deviceā€™s code name ā€•Jasagerā€– ā€“German for ā€•The Yes Sayerā€– or ā€•The Yes Manā€–.
  • 14. 14Ā© SafeNet Confidential and Proprietary Once Aliceā€™s tablet receives the probe response from Chuckā€™s device they begin the process of associating, and within moments her tablet has obtained an IP address this the Pen test deviceā€™s DHCP server. The Pen test deviceā€™s DHCP server provides Aliceā€™s tablet with not only an IP address, but DNS and routing information necessary to get her online. Chuck has the Pen test device ā€•dialled-upā€– to the internet via a pre -configured USB Modem, the default gateway used by Aliceā€™s tablet will be the IP of the Pen test device. Probe responses Probe requests
  • 15. 15Ā© SafeNet Confidential and Proprietary Now that Chuckā€™s internet enabled device has made friends with Aliceā€™s tablet she is free to browse the web and Chuck is free to eavesdrop and even change the web she sees. Using man in the middle tools, Chuck is able to watch what web sites Alice visits (url snarf). Since Chuck is particularly mischievous he prefers to change what servers Alice connects to when looking up a website (dns spoof)ā€”thus replacing would be kitten videos with ones of puppies. Oh the horrors!...
  • 16. 16Ā© SafeNet Confidential and Proprietary Chuck is even capable of saving Aliceā€™s browsing sessions to disk for later analysis (tcpdump), intercept secure communications (sslstrip), or inject malicious code on to websites (ettercap-ng). Alternatively if Chuck chooses not to provide internet access at all the device will still be an effective wireless auditing tool. By enabling DNS spoof Chuck is able to redirect Aliceā€™s browsing session from legitimate websites to the deviceā€™s built in web server, which may host a number of phishing sites, password harvesting or malware.
  • 17. 17Ā© SafeNet Confidential and Proprietary Since Chuck canā€™t stay at the ACME Corp. cafeteria all day, he considers leaving his device on site. The device is concealed in a case with a battery pack, hidden in plain sight.
  • 18. 18Ā© SafeNet Confidential and Proprietary In this case Chuck is able to remotely manage the device a few ways. If no internet access is being provided Chuck must be within range of the device wireless network in order to connect to the management SSID. If internet access is provided, Chuck can configure a persistent SSH tunnel. With an SSH or VPN tunnel enabled, internet traffic from the device connected client routes through the tunnel endpoint ā€“ typically a virtual private server. From this VPS Chuck may also extend the man in the middle attack.
  • 19. 19Ā© SafeNet Confidential and Proprietary www Probe requests Proberequests
  • 20. 20 Wi-Fi MITM Experiment : mk4 karma, urlsnarf, dns spoof , facebook/twitter phishing phishing site
  • 21. 21 Cell phone tracking deviceā€¦.send picā€¦see gps,txt,calls,emailā€¦.
  • 22. 22Ā© SafeNet Confidential and Proprietary Hacking Gadgetsā€¦..who needs themā€¦.when..
  • 23. 23Ā© SafeNet Confidential and Proprietary Hacking Gadgetsā€¦..who needs themā€¦.when..
  • 24. 24Ā© SafeNet Confidential and Proprietary Hacking Gadgetsā€¦..who needs themā€¦.when..
  • 25. 25Ā© SafeNet Confidential and Proprietary The Weapons ā€“ Hands On Cain & Abel is a password recovery tool for Microsoft Operating Systems. It allows easy recovery of various kind of passwords by: -Sniffing the network -Cracking encrypted passwords using Dictionary -Brute-Force and Cryptanalysis attacks -Recording VoIP conversations -Decoding scrambled passwords -Recovering wireless network keys -Revealing password boxes -Uncovering cached passwords -Analyzing routing protocolsā€¦.and more.
  • 26. 26Ā© SafeNet Confidential and Proprietary Cain & Abel has been developed in the hope that it will be useful for network administrators, teachers, security consultants/professionals, forensic staff, security software vendors, professional penetration tester and everyone else that plans to use it for ethical reasons. The latest version is faster and contains a lot of new features like APR (Arp Poison Routing) which enables sniffing on switched LANs and Man-in-the-Middle attacks. The sniffer in this version can also analyze encrypted protocols such as SSH-1 and HTTPS, and contains filters to capture credentials from a wide range of authentication mechanisms. The new version also includes routing protocols authentication monitors & routes extractors, dictionary & brute-force crackers for all common hashing algorithms & for several specific authentications, password/hash calculators, cryptanalysis attacks, password decoders & some not so common utilities related to network and system security. The Weapons ā€“ Hands On
  • 27. 27Ā© SafeNet Confidential and Proprietary -Added support for Windows 2008 Terminal Server in APR-RDP sniffer filter. - Added Abel64.exe and Abel64.dll to support hashes extraction on x64 OS. - Added x64 operating systems support in NTLM hashes Dumper, MS-CACHE hashes Dumper, LSA Secrets Dumper, Wireless Password Decoder, Credential Manager Password Decoder, DialUp Password Decoder. - Added Windows Live Mail (Windows 7) Password Decoder for POP3, IMAP, NNTP, SMTP and LDAP accounts. - Fixed a bug of RSA SecurID Calculator within XML import function. - Fixed a bug in all APR-SSL based sniffer filters to avoid 100% CPU utilization while forwarding data. - Executables rebuilt with Visual Studio 2008. **Be very aware of versions with screenscrape / backdoors, not downloaded from the correct source. The Weapons ā€“ Hands On
  • 28. 28Ā© SafeNet Confidential and Proprietary ARP Poison Select interface - Scan for hosts - Poison ARP Table - Look for PWā€™s Brute Force R$A Calculatorā€¦and more Lets take it for a ā€•Test Driveā€– Industry Example: The Weapons ā€“ Hands On
  • 29. 29Ā© SafeNet Confidential and Proprietary Ophcrack is an open source (GPL licensed) program that cracks Windows passwords by using LM hashes through rainbow tables. The program includes the ability to import the hashes from a variety of formats, including dumping directly from the SAM files of Windows. It is claimed that these tables can crack 99.9% of alphanumeric passwords of up to 14 characters in usually a few minutes. A rainbow table is a lookup table offering a time-memory tradeoff used in recovering the plaintext password from a password hash generated by a hash function, often a cryptographic hash function. A common application is to make attacks against hashed passwords feasible. The Weapons ā€“ Hands On
  • 30. 30Ā© SafeNet Confidential and Proprietary XP Rainbow Tables Example: The Weapons ā€“ Hands On
  • 31. 31Ā© SafeNet Confidential and Proprietary Vista / Win 7 Rainbow Tables Example: The Weapons ā€“ Hands On
  • 32. 32Ā© SafeNet Confidential and Proprietary Example using a XP VM Length = 14 Predefined Charset : Base64 = Decimal + Lowercase + Uppercase + Special Characters < 4min CRACKED! The Weapons ā€“ Hands On
  • 33. 33Ā© SafeNet Confidential and Proprietary Lets take it for a ā€•Test Driveā€– In Under 4min The Weapons ā€“ Hands On
  • 34. 34Ā© SafeNet Confidential and Proprietary CAIN vs OPHCRACK The Weapons ā€“ Hands On
  • 35. 35Ā© SafeNet Confidential and Proprietary CAIN vs OPHCRACK The Weapons ā€“ Hands On
  • 36. 36Ā© SafeNet Confidential and Proprietary