The Shark Jack by Hak5
Last updated
Last updated
A portable network attack and automation tool for pentesters and systems administrators designed to enable social engineering engagements and opportunistic wired network auditing.
This documentation covers the basics of operation and deployment, accessing the Linux shell for advanced operations, Internet connectivity, software updates and payload development.
The e-book PDF generated by this document may not format correctly on all devices. For the most-to-date version, please see https://docs.hak5.org