Defensive hacker Matthew “Jaku” Jakubowski demonstrates how a hacker can easily get control over a company’s online network using high-tech hardware.