# The Shark Jack by Hak5

A portable network attack and automation tool for pentesters and systems administrators designed to enable social engineering engagements and opportunistic wired network auditing.&#x20;

This documentation covers the basics of operation and deployment, accessing the Linux shell for advanced operations, Internet connectivity, software updates and payload development.

![](https://4143471261-files.gitbook.io/~/files/v0/b/gitbook-legacy-files/o/assets%2F-MhxW6geyenAGJvaKW11%2F-MhxWG5xH089Et_2AKSV%2F-MhxWdzq0bdpGJTPvmlr%2Fshark_thumb2_760x.jpg?alt=media\&token=7925d325-b83f-42bf-a858-227955fd84b5)

{% hint style="warning" %}
The e-book PDF generated by this document may not format correctly on all devices. For the most-to-date version, please see <https://docs.hak5.org>
{% endhint %}
