In today's episode, we exfiltrate reconnaissance data from a Windows machine to a Dropbox account using only the OMG cable. The data includes Wi-Fi network names and passwords, system hardware, services running, open ports, and more. Payload used: https://github.com/hak5/omg-payloads/... Dropbox Apps: https://www.dropbox.com/developers/apps -----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆ Our Site → https://www.hak5.org Shop → http://hakshop.myshopify.com/ Subscribe → https://www.youtube.com/user/Hak5Darr... Support → / threatwire Contact Us → / hak5 -----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆ ____________________________________________ Founded in 2005, Hak5's mission is to advance the InfoSec industry. We do this through our award winning educational podcasts, leading pentest gear, and inclusive community – where all hackers belong.