Kody Kinzie

Kody Kinzie is a security researcher at Varonis, with a background in Wi-Fi security and low-cost hacking tools. He hosts the Cyber Weapons Lab show on Null Byte's YouTube channel, a soon to be released show for Hak5, and the Varonis Security Tools podcast. Aside from Wi-Fi hacking, Kody also teaches about open-source intelligence, Python programming, and Arduino-based hacking tools.


Create Your Own Wi-Fi Connected Open Source USB Rubber Ducky

This workshop will be using Arduino IDE to flash the proper program to each microcontroller. It can be downloaded for your operating system from You will also need a device with Wi-Fi access. With two inexpensive microcontrollers, anyone can program and build a Wi-Fi connected keystroke injection tool (the Wi-Fi duck!) that, when plugged into a target computer, can allow a hacker to control it (using a graphic user interface) remotely from up to a mile away. This workshop is for beginners interested in hacking with microcontrollers, hackers interested in learning keystroke injection attacks, and anyone interested in what's possible with low-cost devices and Arduino IDE.

Advanced Wi-Fi Hacking With $5 Microcontrollers

With the price of ESP8266 and ESP32 development boards dropping to between $1 and $5, the Wi-Fi hacking community has embraced these tools as platforms for security research. Kody will go over the capabilities of these extraordinary devices and demonstrate the community projects that take advantage of them. This talk will cover a Wi-Fi deauther and network cloner with a web GUI, advanced serial CLI interfaces to enable packet sniffing and monitoring, unmasking modern MAC address privacy protections to track mobile devices, and brute-force discovery of trusted networks stored in nearby Wi-Fi devices. Kody will also show how these microcontrollers have been used to create safe and fun Wi-Fi hacking CTF games for beginners. Attendees will learn how these ultra-cheap devices embedded in most "smart" light bulbs can disable Wi-Fi security cameras, reveal work and personal affiliations by identifying previously joined networks, and track the location of their smartphone in public.