Ex-NSA hacker tools for real world pentesting
Learn real world pentesting plus which tools are the best to use with Ex-NSA Hacker Neal Bridges. Neal tells us what he carries in his backpack when doing real world pentests.
My apologies for the issues with this video. I had to remove the previously uploaded video because I had movie clips like Mr Robot and The Spy Game in the video and YouTube didn't like them... so I had to remove the video :(
Menu:
0:00 ▶️ Introduction
1:17 ▶️ Neal sees pentesting differently
2:00 ▶️ Neal's advice from experience
3:18 ▶️ Neal's 5,000 pentests
4:30 ▶️ Take NSA and experience
5:10 ▶️ Preparation is key
5:50 ▶️ OSINT
6:30 ▶️ Actual Pentest report
7:50 ▶️ Pretexting
8:45 ▶️ Another real world example
9:30 ▶️ Planning is very important
10:15 ▶️ Leave stuff in your car?
11:55 ▶️ Right tools for the job
12:05 ▶️ Top tools
12:30 ▶️ Extra cables
12:58 ▶️ Hak5 Ethernet cable
13:10 ▶️ Is Hak5 a necessity
13:57 ▶️ Rubber Ducky
14:30 ▶️ Hak5 are great
15:00 ▶️ Real world example of equipment
15:30 ▶️ You can create your own stuff
16:10 ▶️ Your time is money
16:30 ▶️ Proxmark
17:30 ▶️ Crazy RFID reader
18:50 ▶️ Poor planning RFID example
20:20 ▶️ Your time is worth something!
21:00 ▶️ Hone your tradecraft
21:20 ▶️ Proxmark explanation
21:50 ▶️ A reader doesn't give you access. You need a pretext
23:50 ▶️ Social engineering
25:50 ▶️ You need a story
26:04 ▶️ Social Engineering vs tech
29:00 ▶️ Physical access is king
30:00 ▶️ What to do once past the door
31:19 ▶️ Military facility pentest
33:27 ▶️ Look for a network port
34:49 ▶️ You want to get out of there
35:04 ▶️ Hak5 Lan turtle
36:35 ▶️ Back of computer vs switch
37:32 ▶️ Pop it into the back of the computer
38:11 ▶️ What about WiFi
38:50 ▶️ TP-Link WiFi Card
39:50 ▶️ Ubertooth
40:50 ▶️ HackRF One
41:56 ▶️ Hak5 Pineapple
42:09 ▶️ SDR
43:00 ▶️ Real world example
44:13 ▶️ Alfa Network Adapter
44:50 ▶️ Wifi Hacking
44:49 ▶️ Alfa not practical so much
46:20 ▶️ You cannot charge for a WiFi pentest
47:17 ▶️ You are making it real
47:45 ▶️
Watch on YouTube ↗
(saves to browser)
Sign in to unlock AI tutor explanation · ⚡30
Playlist
Uploads from David Bombal · David Bombal · 0 of 60
← Previous
Next →
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
RYU SDN Controller Part 4: Graphical User Interface (GUI): Practical GNS3 SDN and OpenFlow
David Bombal
HPE Network Protector SDN Application Part 1 - Introduction
David Bombal
HPE Network Protector SDN Application Part 2 : DNS Interception using OpenFlow
David Bombal
HPE Network Protector SDN Application Part 3 - Lab Setup using Physical Switches
David Bombal
HPE Network Protector SDN Application Part 4 - Demo of malicious websites blocked
David Bombal
HPE Network Protector SDN Application Part 5 - Demo OpenFlow table interception flows
David Bombal
HPE Network Protector SDN Application Part 6 - Demo of Physical Switch configuration
David Bombal
HPE Network Protector SDN Application Part 7 - Demo Service Insertion Tunnel / GRE Tunnel
David Bombal
HPE Network Protector SDN Application Part 8 - Demo SDN OpenFlow Reporting
David Bombal
HPE Network Protector SDN Application Part 9 - Demo switches interception of DNS traffic
David Bombal
GNS3 Talks: GNS3 version 1.5.X Appliance Tips
David Bombal
CCNA 200-125 Exam: AAA demo: TACACS+ with GNS3
David Bombal
GNS3 2.0.0 beta 2 install
David Bombal
CCNA #012: Learn SNMP with GNS3, Wireshark and Solarwinds NPM - CCNA 200-125 exam
David Bombal
CCNA #013: Spanning Tree CCNA Exam Questions: Know the answer? CCNA 200-125 exam
David Bombal
GNS3 2.0.0 beta : GNS3 VM integration with GNS3 GUI
David Bombal
CCNA #018: Routing exam questions: Who wins? OSPF, EIGRP or RIP? Sure? CCNA 200-125 exam
David Bombal
CCNA #019: Spanning Tree CCNA Exam Questions: Root Bridge, Root Port and more: CCNA 200-125 exam
David Bombal
GNS3 Download, installation and configuration - GNS3 1.5.3 and Windows 10
David Bombal
CCNA #023 EIGRP Neighbor Troubleshooting (DUAL Issues) for the CCNA 200-125 Exam
David Bombal
GNS3 2.0 Architecture and schema Part 1: What is the GNS3 Controller?
David Bombal
GNS3 2.0 Architecture and schema Part 2: Emulators and virtualization
David Bombal
CCNA #028 VTP Troubleshooting for the CCNA 200-125 Exam
David Bombal
CCNA #029 VTP & DTP Troubleshooting for the CCNA 200-125 Exam
David Bombal
CCNA #030 VTP Troubleshooting for the CCNA 200-125 Exam
David Bombal
GNS3 : How to download Cisco IOS images and VIRL images. Which is the best? How do you get them?
David Bombal
GNS3 ASA setup: Import and configure Cisco ASAv with GNS3
David Bombal
GNS3 switching setup and options: Cisco and other switching options in GNS3
David Bombal
GNS3 switching setup and options Part 2: GNS3 unmanaged built-in switch
David Bombal
GNS3 switching setup and options Part 3: Router on a sick with GNS3 unmanaged built-in switch
David Bombal
GNS3 switching setup and options Part 4: Etherswitch Router for Cisco Dynamips Part 1
David Bombal
GNS3 switching setup and options Part 5: Etherswitch Router for Cisco Dynamips Part 2
David Bombal
GNS3 switching setup and options Part 6: Etherswitch, Wireshark, 802.1Q, InterVLAN routing
David Bombal
GNS3 Talks: Docker, Open vSwitch, SDN and OpenFlow Part 1: GNS3 Switching Part 7
David Bombal
GNS3 Talks: Docker, Open vSwitch, SDN and OpenFlow Part 2: GNS3 Switching Part 8
David Bombal
GNS3 Talks: Docker, Open vSwitch, SDN and OpenFlow Part 3: GNS3 Switching Part 9
David Bombal
GNS3 Talks: Docker, Open vSwitch, SDN and OpenFlow Part 4: GNS3 Switching Part 10
David Bombal
GNS3 Talks: Docker, Open vSwitch, SDN and OpenFlow Part 5: GNS3 Switching Part 11
David Bombal
GNS3 Nexus (NX-OSv) switch setup and configuration Part 1: GNS3 switching options Part 12
David Bombal
GNS3 Nexus (NX-OSv) switch setup and configuration Part 2: GNS3 switching options Part 13
David Bombal
GNS3 Talks: Docker, Open vSwitch, SDN and OpenFlow Part 6: GNS3 Switching Part 14
David Bombal
GNS3 Talks: Docker, Open vSwitch, SDN and OpenFlow Part 7: GNS3 Switching Part 15
David Bombal
GNS3 Cisco CSR 1000v setup and configuration Part 1: GNS3 NFV
David Bombal
GNS3 Cisco CSR 1000v setup and configuration Part 2: GNS3 NFV
David Bombal
GNS3 Talks: Use the NAT node to connect GNS3 to the Internet easily!
David Bombal
GNS3 Talks: GNS3 2.0 RC1 is now available
David Bombal
GNS3 Talks: GNS3 2.0 Portable Projects - easily export and import GNS3 projects
David Bombal
GNS3 Talks: Multiple clients sharing projects in real time, plus console session shadowing!
David Bombal
CCNA #035 NAT Troubleshooting Scenario 1 - Can you find the issue? CCNA Exam 200-125 troubleshooting
David Bombal
CCNA #036 NAT Troubleshooting Scenario 2 - Can you find the issue? CCNA Exam 200-125 troubleshooting
David Bombal
GNS3 Talks: ESXi, GNS3 VM and KVM support Part 1: leverage servers and the cloud
David Bombal
CCNA #037 OSPF Troubleshooting - can you find the issue? CCNA Exam 200-125 troubleshooting
David Bombal
GNS3 Talks: ESXi, GNS3 VM and KVM support Part 2: leverage servers and the cloud
David Bombal
CCNA #038 NAT Troubleshooting Scenario 3 - Can you find the issue? CCNA Exam 200-125 troubleshooting
David Bombal
CCNA #039 - OSPF DR, BR and DROTHER Election - do you know the answers?
David Bombal
CCNA #040 NAT Troubleshooting Scenario 4 - Can you find the issue? CCNA Exam 200-125 troubleshooting
David Bombal
GNS3 Talks: Arista vEOS GNS3 import and configuration Part 1
David Bombal
CCNA #041 - OSPF DR, BR and DROTHER Election - do you know the answers?
David Bombal
GNS3 Talks: Arista vEOS GNS3 import and configuration Part 2
David Bombal
GNS3 Talks: ipterm: Linux, Docker, Python, SDN and more! Part 1
David Bombal
Related AI Lessons
⚡
⚡
⚡
⚡
Why Businesses Quietly Accept Technology Friction as “Normal”
Medium · Cybersecurity
The Model You Just Downloaded Might Own Your Network — What I Learned Building Defenses Against AI…
Medium · Cybersecurity
I Found Backdoored AI Models on Hugging Face — And So Has Everyone Else Who Bothered to Look
Medium · Cybersecurity
The XSS Escalation Playbook: From Basic Reflection to DOM Breakouts
Medium · Cybersecurity
Chapters (52)
Introduction
1:17
Neal sees pentesting differently
2:00
Neal's advice from experience
3:18
Neal's 5,000 pentests
4:30
Take NSA and experience
5:10
Preparation is key
5:50
OSINT
6:30
Actual Pentest report
7:50
Pretexting
8:45
Another real world example
9:30
Planning is very important
10:15
Leave stuff in your car?
11:55
Right tools for the job
12:05
Top tools
12:30
Extra cables
12:58
Hak5 Ethernet cable
13:10
Is Hak5 a necessity
13:57
Rubber Ducky
14:30
Hak5 are great
15:00
Real world example of equipment
15:30
You can create your own stuff
16:10
Your time is money
16:30
Proxmark
17:30
Crazy RFID reader
18:50
Poor planning RFID example
20:20
Your time is worth something!
21:00
Hone your tradecraft
21:20
Proxmark explanation
21:50
A reader doesn't give you access. You need a pretext
23:50
Social engineering
25:50
You need a story
26:04
Social Engineering vs tech
29:00
Physical access is king
30:00
What to do once past the door
31:19
Military facility pentest
33:27
Look for a network port
34:49
You want to get out of there
35:04
Hak5 Lan turtle
36:35
Back of computer vs switch
37:32
Pop it into the back of the computer
38:11
What about WiFi
38:50
TP-Link WiFi Card
39:50
Ubertooth
40:50
HackRF One
41:56
Hak5 Pineapple
42:09
SDR
43:00
Real world example
44:13
Alfa Network Adapter
44:50
Wifi Hacking
44:49
Alfa not practical so much
46:20
You cannot charge for a WiFi pentest
47:17
You are making it real
🎓
Tutor Explanation
DeepCamp AI