Put together by a band of IT ninjas, security professionals and hardcore gamers, Hak5 isn't your typical tech show. We take on hacking in the old-school sense, covering everything from network security, open source and forensics, to DIY modding and the homebrew scene. Then we wrap it all up with a... Read More
Reverse Engineering in practice. Configuring Cisco, IPTables and other firewalls with a sweet graphical utility. A little nostalgia with the Hak5 BBS and cracking open the Pineapple, a demo of Jasager.
Chris Gerling shows us how to do a little reverse engineering with an educational tool called a CrackMe. These aptly named CrackMe files are great for practicing reverse engineering skills. Chris walks us through the steps involved in unlocking the Crackme's code using .NET Reflector, some Python code, and a little a hex calculator. More detail in Chris' blog post and more Crackmes at LearnSecurityOnline.com.
Matt demonstrates a killer app for anyone who manages firewalls. Firewall Builder creates, validates and deploys configurations to popular firewalls from your standard Linksys WRT54G using Sveasoft, to iptables, to Cisco using an intuitive graphical interface. Can we say access-list inside_access_out permit tcp any eq www host hak5.org eq www? Check out Matt's full review at MattLestock.com
Remember the good ol' days before the Internet? Ever access a BBS? How about 1200 baud bliss with an xmodem transfer of the latest leet ezine from across the country via a toll-free PBX or some magical tones? If not that's cool too, we've got just the thing for you. How about a multiplayer text adventure, the predecessor to modern day MMORPGs? That's right, the Hak5 BBS is up and running so telnet on over to bbs.hak5.org, port 23 of course, and check out the door games. We're running an active game of Legend of the Red Dragon as well as dopewars, pimpwars, food fight, and more.
Darren cracks open the pineapple and demos Jasager. He even pronounces it correctly this episode. In our controlled environment we go into how the system works, the interface, setting it up, and the future of the project. We'll be building one from scratch on 405, then stay tuned for an interview with developer Robin Wood from this years Toorcon in San Diego. You can read up on Jasager and get yourself a fresh tarball at Robin's site.
Speaking of Toorcon, if you're going and wanna meetup for a drink or say hi and grab some stickers be sure to follow one of us on Twitter. You can find us all at @hak5
And on a final production note, with this episode and onwards we fixed the issue that was mudding up the sad standard-def video signals from our cameras. We're still working on going HD and hope to be there by the end of the year. More details.
6 days ago
Employers want social media passwords, US gets a #CPO, and #TheOnion! All that and more this time on #ThreatWire! http://t.co/SrZpicvnt6
8 days ago
#Installing #Solar panels, #Google #Chrome #extensions, and more on @Hak5! http://t.co/QppYLgZpi5
8 days ago
Legalizing #Internet eavesdropping, #LivingSocial is #hacked, and more on this weeks #ThreatWire! http://t.co/xyIxzy8kes
9 days ago
@thescribe I didn't! They were disabled and enabled throughout the segment. Each one has a different icon. - @Snubs
9 days ago
@myraitnetwork thank you!
24 days ago
#PGP #Encrypt your email, back up your #Gmail Account with #Ubuntu, text #messaging your #WiFi #Pineapple On #Hak5! http://t.co/KSZeO4GEPU