Riding the Crazy Train

Details of my frequent travels through life via this self titled mode of transportation

Friday, May 22, 2020

Bypass Hardware Firewalls

This is just a collection of links about my DEF CON 22 presentation, and the two tools I released:

Slides:
http://www.slideshare.net/bz98/defcon-22-bypass-firewalls-application-white-lists-secure-remote-desktops-in-20-seconds

Tools:
https://github.com/MRGEffitas/Write-into-screen
https://github.com/MRGEffitas/hwfwbypass

Presentation video from Hacktivity:
https://www.youtube.com/watch?v=KPJBckmhtZ8

Technical blog post:
https://blog.mrg-effitas.com/bypass-hardware-firewalls-def-con-22/

Have fun!




More information


  1. Curso De Hacking Etico Gratis
  2. Cracker Informatico
  3. Hacking Academy
  4. Hacking Usb
  5. Wifi Hacking App
  6. Curso De Hacker Gratis Desde Cero
  7. Como Aprender A Hackear
  8. Curso Ethical Hacking
  9. Reddit Hacking
  10. Elladodelmal
  11. Certificacion Ethical Hacking
  12. Black Hacker
Posted by Tracie P at 2:39 AM

No comments:

Post a Comment

Newer Post Older Post Home
Subscribe to: Post Comments (Atom)

About Me

My photo
Tracie P
The one trying to fill too many roles in too little time, perfectly. of course!
View my complete profile

My Blog List

  • I Work in Pages
    Happy New Year!
    5 years ago
  • Launder, Fold, Repeat
    2011-2012 School Year at a glance...
    13 years ago
  • Our Tender Moments...

Followers

Blog Archive

  • ►  2025 (45)
    • ►  July (1)
    • ►  June (1)
    • ►  May (2)
    • ►  April (3)
    • ►  March (7)
    • ►  February (6)
    • ►  January (25)
  • ►  2024 (53)
    • ►  November (2)
    • ►  October (1)
    • ►  July (1)
    • ►  May (1)
    • ►  February (4)
    • ►  January (44)
  • ►  2023 (65)
    • ►  November (1)
    • ►  September (4)
    • ►  August (4)
    • ►  July (6)
    • ►  June (22)
    • ►  May (28)
  • ►  2022 (1)
    • ►  August (1)
  • ▼  2020 (359)
    • ►  September (5)
    • ►  August (98)
    • ►  July (102)
    • ►  June (30)
    • ▼  May (57)
      • New Printers Vulnerable To Old Languages
      • Bypass Hardware Firewalls
      • Ufonet - Dos And Ddos Attack Tool | How To Install...
      • Facebook Plans To Launch Its Own Cryptocurrency
      • Linux Command Line Hackery Series - Part 3
      • CSRF Referer Header Strip
      • C++ Std::Condition_Variable Null Pointer Derreference
      • OVER $60 MILLION WORTH OF BITCOINS HACKED FROM NIC...
      • Webkiller Tool | Information Gathering | Github
      • Secret Hack Codes For Android Mobile Phones
      • Open Sesame (Dlink - CVE-2012-4046)
      • OnionDuke Samples
      • Entropy: Netwave And GoAhead IP Webcams Exploiting...
      • OSIF: An Open Source Facebook Information Gatherin...
      • Mythbusters: Is An Open (Unencrypted) WiFi More Da...
      • How To Switch From 32-Bit Windows 10 To 64-Bit Win...
      • How Do I Get Started With Bug Bounty ?
      • Theharvester: Email Harvesting Throughout Year
      • Learning Web Pentesting With DVWA Part 3: Blind SQ...
      • WHO IS ETHICAL HACKER
      • Linux Command Line Hackery Series - Part 3
      • Steghide - A Beginners Tutorial
      • Nemesis: A Packet Injection Utility
      • RFCrack Release - A Software Defined Radio Attack ...
      • WiFiJammer: Amazing Wi-Fi Tool
      • How To Unlock Forgot Pattern Password In Android P...
      • Linux Command Line Hackery Series: Part 2
      • November 2019 Connector
      • Entropy: Netwave And GoAhead IP Webcams Exploiting...
      • WHAT IS ETHICAL HACKING
      • Deepin Or UbuntuDDE
      • How Block Chain Technology Can Help Fight Wuhan Co...
      • HACKING GMAIL FOR FREE CUSTOM DOMAIN EMAIL
      • Voodoo-Kali - Kali Linux Desktop On Windows 10
      • Hacking Facebook By Using PHP Script | Social Engi...
      • SubOver - A Powerful Subdomain Takeover Tool
      • Reversing C++ String And QString
      • Cracking Windows 8/8.1 Passwords With Mimikatz
      • How Do I Get Started With Bug Bounty ?
      • DEFINATION OF HACKING
      • Part I. Russian APT - APT28 Collection Of Samples...
      • ASIS CTF Quals 2015 - Sawthis Writeup - Srand Remo...
      • SubOver - A Powerful Subdomain Takeover Tool
      • Blockchain Exploitation Labs - Part 3 Exploiting I...
      • Powerob - An On-The-Fly Powershell Script Obfuscat...
      • Social Engineering Pentest Professional(SEPP) Trai...
      • Save Your Cloud: Gain Root Access To VMs In OpenNe...
      • JoomlaScan - Tool To Find The Components Installed...
      • Networking | Routing And Switching | Tutorial 2 | ...
      • Linux Stack Protection By Default
      • HOW TO ROOT A SERVER? – SERVER ROOTING
      • Defcon 2015 Coding Skillz 1 Writeup
      • $$$ Bug Bounty $$$
      • BurpSuite Introduction & Installation
      • ISPY: Exploiting EternalBlue And BlueKeep Vulnerab...
      • Sanity Slips Away!
      • The Final Form Of My Home Made Magnetic Army Trans...
    • ►  April (44)
    • ►  March (15)
    • ►  February (8)
  • ►  2019 (1090)
    • ►  December (11)
    • ►  November (58)
    • ►  September (179)
    • ►  August (298)
    • ►  July (281)
    • ►  June (197)
    • ►  May (51)
    • ►  April (3)
    • ►  March (12)
  • ►  2018 (3)
    • ►  December (1)
    • ►  June (2)
  • ►  2013 (1)
    • ►  November (1)
  • ►  2010 (9)
    • ►  August (1)
    • ►  June (1)
    • ►  March (3)
    • ►  February (1)
    • ►  January (3)
  • ►  2009 (12)
    • ►  December (3)
    • ►  October (1)
    • ►  September (3)
    • ►  August (1)
    • ►  May (1)
    • ►  April (1)
    • ►  February (2)
Watermark theme. Theme images by TayaCho. Powered by Blogger.