• Premium IT-Security Tools
  • RFID Security
  • Digital Forensic
  • LEA & Rugged Products
  • Procurement
  • Premium IT-Security Tools
  • RFID Security
  • Digital Forensic
  • LEA & Rugged Products
  • Procurement

Shark Jack HAK5

158.00 €
incl. VAT, plus delivery
In stock
Delivery time: 5 day(s)

Description


Shark Jack HAK5


Hotplug attack, meet LAN. These pocket-sized pentest boxes perform network assessments in seconds!

As tiny Linux computers, they run DuckyScript™ payloads powered by Bash. Armed out-of-the-box with an ultra fast network scanner, you'll get recon with the flick of a switch.

Or flip the switch to arming mode and sync up with the online library for a plethora of payloads — remote access, exfiltration & more.

With feedback by RGB LED, and now live in-shell with USB-C Serial on the NEW Cable edition.


AT THE READY

Perfect for physical engagements. Keep this opportunistic wired network attack platform at the ready for intel & recon at a moments notice.

Even get live results and instant access to a Linux shell on the LAN with the HAK5 Shark Jack Cable edition as shown.


SIMPLE SCRIPTING

The simple scripting language lets you quickly develop payloads using bash and familiar Linux network tools so you can automate any attack.



CLOUD C2 ENABLED

Jack into a LAN. Gather loot. Exfiltrate. Even interact with payloads and drop into a full Linux shell right from the web


LINUX UNDER THE HOOD

Root access with all the fixings and find familiar command line network utilities at the ready.

Just SSH in, or even drop into a shell over USB-C serial with the Cable edition. Widely support by Android OTG + Windows, Mac & Linux.


Shark Jack Hak5 bei HakMac


Product safety information

Safety Notice: Penetrationtest Tools The use of Pentest Tools is subject to strict legal regulations. This device is a powerful tool for security analysis and penetration testing and must only be used in compliance with applicable laws. Unauthorized access to networks, privacy violations, or any other unlawful activities are strictly prohibited. Ensure that you have obtained explicit permission from the owner of the target network before use. Improper use may result in legal consequences, including criminal prosecution. Use the Pentest Tools solely for ethical and legal purposes, such as enhancing IT security within your organization or conducting authorized tests. The Manufacturer and the retailer assume no liability for damages resulting from misuse of this device. It is the user’s responsibility to comply with all local laws and regulations.

Manufacturer information
Manufacturer:HAK5Hak5 LLC, 5473 Blair Rd, Ste 100 PMB 39371, Dallas, TX 7523139371 DallasTXUnited States
shop(at)hak5.org
Responsible economic operator in the EU:HackmoD GmbHBessemerstr.8212103 BerlinGermany
info(at)hackmod.de