skip to main | skip to sidebar

Confluence

A blog for Confluence group.

Thursday, 23 April 2020

Bypass Hardware Firewalls

This is just a collection of links about my DEF CON 22 presentation, and the two tools I released:

Slides:
http://www.slideshare.net/bz98/defcon-22-bypass-firewalls-application-white-lists-secure-remote-desktops-in-20-seconds

Tools:
https://github.com/MRGEffitas/Write-into-screen
https://github.com/MRGEffitas/hwfwbypass

Presentation video from Hacktivity:
https://www.youtube.com/watch?v=KPJBckmhtZ8

Technical blog post:
https://blog.mrg-effitas.com/bypass-hardware-firewalls-def-con-22/

Have fun!




Related news

  1. Capture The Flag Hacking
  2. Como Hackear
  3. Hacking Software
  4. Codigo Hacker
  5. Nivel Basico
  6. Hacking Con Python
  7. Nivel Basico
  8. Hacking Netflix Account
  9. Hacking Quotes
  10. Elladodelmal
Posted by Confluence at 00:26

No comments:

Post a Comment

Newer Post Older Post Home
Subscribe to: Post Comments (Atom)

Blog Archive

  • ►  2025 (54)
    • ►  June (1)
    • ►  May (2)
    • ►  April (4)
    • ►  March (9)
    • ►  February (5)
    • ►  January (33)
  • ►  2024 (53)
    • ►  December (2)
    • ►  November (3)
    • ►  September (1)
    • ►  July (2)
    • ►  June (1)
    • ►  May (1)
    • ►  February (5)
    • ►  January (38)
  • ►  2023 (70)
    • ►  November (1)
    • ►  September (2)
    • ►  August (7)
    • ►  July (4)
    • ►  June (27)
    • ►  May (29)
  • ►  2022 (1)
    • ►  August (1)
  • ▼  2020 (376)
    • ►  September (5)
    • ►  August (98)
    • ►  July (102)
    • ►  June (29)
    • ►  May (51)
    • ▼  April (67)
      • April 2019 Connector
      • LEGALITY OF ETHICAL HACKING
      • Vlang Binary Debugging
      • How To Hack And Trace Any Mobile Phone With A Free...
      • Hacking All The Cars - Part 1
      • DOWNLOAD BLACK STEALER V2.1 FULL
      • HACKING PASSWORDS USING CREDENTIAL HARVESTER ATTACK
      • OSIF: An Open Source Facebook Information Gatherin...
      • HOW TO DEFACE A WEBSITE USING REMOTE FILE INCLUSIO...
      • Bypass Hardware Firewalls
      • OWASP Web 2.0 Project Update
      • Spykey - FUD Win32 Keylogger And Reverse Shell
      • AutoNSE - Massive NSE (Nmap Scripting Engine) Auto...
      • DOWNLOAD OCTOSNIFF 2.0.3 FULL VERSION – PLAYSTATIO...
      • Spykey - FUD Win32 Keylogger And Reverse Shell
      • Top Linux Commands Related To Hardware With Descri...
      • ShellShock Payload Sample Linux.Bashlet
      • DNSProbe - A Tool Built On Top Of Retryabledns Tha...
      • NcN 2015 CTF - theAnswer Writeup
      • Cain And Abel
      • Support For XXE Attacks In SAML In Our Burp Suite ...
      • Over 700 Malicious Typosquatted Libraries Found On...
      • Top 10 Best Google Gravity Tricks 2018
      • AlienSpy Java RAT Samples And Traffic Information
      • $$$ Bug Bounty $$$
      • HiddenWasp Linux Malware Backdoor Samples
      • TLS-Attacker V2.2 And The ROBOT Attack
      • Cracking Windows 8/8.1 Passwords With Mimikatz
      • SneakyEXE: An "UAC-Bypassing" Codes Embedding Tool...
      • BruteSpray: A Brute-forcer From Nmap Output And Au...
      • Cómo Instalar Ubuntu 19.10 Junto A Windows O Como ...
      • Theharvester: Email Harvesting Throughout Year
      • OnionDuke Samples
      • Video Archives Of Security Conferences And Workshops
      • How To Switch From 32-Bit Windows 10 To 64-Bit Win...
      • Gridcoin - The Good
      • WPSeku V0.4 - Wordpress Security Scanner
      • Top System Related Commands In Linux With Descript...
      • How To Start | How To Become An Ethical Hacker
      • "I Am Lady" Linux.Lady Trojan Samples
      • Structure Part I: The Basics
      • APPLE IPHONE X FACE ID CAN BE HACKED WITH SILICON ...
      • Black Hat Python Free PDF
      • inBINcible Writeup - Golang Binary Reversing
      • Arris Cable Modem Backdoor - I'm A Technician, Tru...
      • 5 BEST HACKING BOOKS 2018
      • CertCrunchy - Just A Silly Recon Tool That Uses Da...
      • Nemesis: A Packet Injection Utility
      • Brutality: A Fuzzer For Any GET Entries
      • Top 10 Great Gifts For The Hacker In Your Life
      • TYPES OF HACKER
      • ShellShock Payload Sample Linux.Bashlet
      • Backtrack4
      • WHAT IS ETHICAL HACKING
      • Hacking Everything With RF And Software Defined Ra...
      • EasySploit: A Metasploit Automation Bash Scripts T...
      • OVER $60 MILLION WORTH OF BITCOINS HACKED FROM NIC...
      • Blockchain Exploitation Labs - Part 2 Hacking Bloc...
      • WHO IS ETHICAL HACKER
      • Linux/AirDropBot Samples
      • The Live HTML Editor
      • Hacking Windows 95, Part 2
      • August Connector
      • Sherloq - An Open-Source Digital Image Forensic To...
      • Data Types, Variables And Arrays In Java
      • Boys’ Club, Short Film, Review And Interview
      • The Tormenting Of Jones, Short Film, Review And In...
    • ►  March (15)
    • ►  February (9)
  • ►  2019 (1161)
    • ►  December (12)
    • ►  November (79)
    • ►  September (201)
    • ►  August (313)
    • ►  July (299)
    • ►  June (198)
    • ►  May (44)
    • ►  April (3)
    • ►  March (12)
  • ►  2018 (3)
    • ►  June (3)
  • ►  2015 (2)
    • ►  September (1)
    • ►  April (1)
  • ►  2008 (11)
    • ►  July (1)
    • ►  June (3)
    • ►  May (7)

Contributors

  • Amit
  • Confluence