Skip to product information
1 of 2

Hak5

C2 - Hak5 Cloud Command and Control Pro

C2 - Hak5 Cloud Command and Control Pro

Regular price $375.00 AUD
Regular price Sale price $375.00 AUD
Sale Sold out
Taxes included. Shipping calculated at checkout.

Cloud C2 - Professional Version

Remote Pentesting made easy.

Ship Hak5 Gear, Get On-Site Results.

Pentest Anywhere, Right from the Web

Cloud C² makes it easy for pentesters and security teams to deploy and manage Hak5 gear from the cloud.

Cloud C² is the intersection of Hak5 hardware mastery, software expertise, and their eternal ambition to provide smarter pentest tools.

Setup
Provision Hak5 gear with Cloud C² in just a few clicks.

Ship
Ship it to the client site. All they do is plug it in

Access
Test their LAN and WiFi over the web from Cloud C².

Scan, pivot, and assess from the LAN and WiFi airspace.

Maintain access for the next engagement, continue to monitor and assess, or perform APT-like attack simulation – 24/7/365.

Cloud C² works with the WiFi Pineapple, LAN Turtle, Packet Squirrel, Screen Crab, Shark Jack and Key Croc.

Professional Version:

  • Up to 50 Devices
  • Self Hosted (Windows, macOS, Linux)
  • Single user, Single Site, Standard Auditing
  • Device Tunnelling Services, Web Terminal
  • WiFi Pineapple web interface proxy
  • One-Time Purchase, Perpetual Commercial License.
  • Hak5 Standard Support - valid for 1 year and up to 10 tickets. You will receive a professional response within 2 business days. Technical support is provided by e-mail Monday-Friday except major holidays.

Cloud C2 Features

Live Insights
Broad visibility into wired and wireless landscape

Intuitive Dashboard
Thoughtfully designed to assess the situation at-a-glance

Complete Control
Command the airwaves with the WiFi Pineapple® suite

Web Shell
Complete Linux terminals on all your devices

Hak5 Gear Ready
Works with our top penetration testing devices

Simple Deployment
Drag-and-drop one file to provision a device

Setup in Minutes
A single executable for Windows, Mac and Linux

Self Hosted
Install on the infrastructure you already own

Privacy First
Devices communicate over encrypted backhauls

Secure by Default
Automatic HTTPS setup and management

View full details