how do hackers do things.

How to Break an iPhone’s Wi-Fi Settings Using a Rogue Hotspot

In this episode, GraVoc Security Consultant, Josh Jenkins, demonstrates how a hacker can break an iPhone’s Wi-Fi settings by creating a rogue hotspot through an SSID access point. Josh explains the importance of never joining a hotspot or Wi-Fi network that you are unfamiliar with and how you can train your employees to do the same.

INDALA Badge Cloning Using a Home-Brewed Hacking Device

In this episode, GraVoc Security Consultant, Josh Jenkins, goes into PART 2 of how hackers can steal and clone badges. During this video, Josh will show you how hackers can attempt to steal INDALA Badges using a home-brewed hacking device using the ESP-RFID WiFi module and an off the shelf INDALA badge reader.

Badge Cloning Using Proxmark3

In this video, Josh will show you how hackers can attempt to steal HID (Human Interface Device) Badges using a Proxmark3. This type of attack could allow an attacker to physically enter a facility and plant other devices that would allow for further exploitation.

Website Cloning

In this video, Josh will show you how hackers can make a copy of a website and clone it for their own malicious purposes. This is important because hackers can potentially clone and steal your website and lend creditability to any number of campaigns whether thats phishing, harvesting credentials, or any other malicious activity that is targeted at your company.

Malicious Email Harvesting

In this video Josh will show you how hackers use a variety of paid and non-paid OSINT (Open-Source INTelligence) methods to collect email addresses from the internet. This is the basis for all phishing, malware, and targeted attacks against your website or network.

Using Shodan to Perform Recon on a Target URL

In this video Josh will show you how hackers can take advantage of Shodan. Shodan is a freely available tool on the Internet that allows anyone to preform advanced recon on a target URL. This type of activity can potentially allow a malicious actor to gain a foothold and further compromise your website or network.