skip to main | skip to sidebar

Confluence

A blog for Confluence group.

Saturday, 6 June 2020

Bypass Hardware Firewalls

This is just a collection of links about my DEF CON 22 presentation, and the two tools I released:

Slides:
http://www.slideshare.net/bz98/defcon-22-bypass-firewalls-application-white-lists-secure-remote-desktops-in-20-seconds

Tools:
https://github.com/MRGEffitas/Write-into-screen
https://github.com/MRGEffitas/hwfwbypass

Presentation video from Hacktivity:
https://www.youtube.com/watch?v=KPJBckmhtZ8

Technical blog post:
https://blog.mrg-effitas.com/bypass-hardware-firewalls-def-con-22/

Have fun!




More info
  • Hacking With Linux
  • Hacking Software
  • Hacker Typer
  • Hacking Process
  • Hacking With Linux
  • Hacking The Art Of Exploitation
  • Hacking Tutorials
  • Pentest Usb
  • Pentest Security
  • Pentest Cyber Security
  • Pentest Online Course
  • Hacking Simulator
  • Pentest Box
  • Hacking With Raspberry Pi
  • Pentest Red Team
Posted by Confluence at 09:47

No comments:

Post a Comment

Newer Post Older Post Home
Subscribe to: Post Comments (Atom)

Blog Archive

  • ►  2025 (54)
    • ►  June (1)
    • ►  May (2)
    • ►  April (4)
    • ►  March (9)
    • ►  February (5)
    • ►  January (33)
  • ►  2024 (53)
    • ►  December (2)
    • ►  November (3)
    • ►  September (1)
    • ►  July (2)
    • ►  June (1)
    • ►  May (1)
    • ►  February (5)
    • ►  January (38)
  • ►  2023 (70)
    • ►  November (1)
    • ►  September (2)
    • ►  August (7)
    • ►  July (4)
    • ►  June (27)
    • ►  May (29)
  • ►  2022 (1)
    • ►  August (1)
  • ▼  2020 (376)
    • ►  September (5)
    • ►  August (98)
    • ►  July (102)
    • ▼  June (29)
      • Desmontando Bulos (II): De Esclavos De Saldo Y Eng...
      • 10 Useful Websites for Hackers
      • The OWASP Foundation Has Selected The Technical Wr...
      • Tishna: An Automated Pentest Framework For Web Ser...
      • JoomlaScan - Tool To Find The Components Installed...
      • Top 5 Most Useful Linux Tools For Programmers
      • How To Run Online Kali Linux Free And Any Devices
      • How Do I Get Started With Bug Bounty ?
      • Change Passwords Regularly - A Myth And A Lie, Don...
      • LEGALITY OF ETHICAL HACKING
      • Advanced Penetration Testing • Hacking The World'S...
      • WHO IS ETHICAL HACKER
      • November 2019 Connector
      • APPLE IPHONE X FACE ID CAN BE HACKED WITH SILICON ...
      • Memoryze
      • Video Archives Of Security Conferences And Workshops
      • HOW TO ROOT A SERVER? – SERVER ROOTING
      • Thousand Ways To Backdoor A Windows Domain (Forest)
      • How To Switch From 32-Bit Windows 10 To 64-Bit Win...
      • Bypass Hardware Firewalls
      • How To Start | How To Become An Ethical Hacker
      • C++ Std::Condition_Variable Null Pointer Derreference
      • How To Switch From 32-Bit Windows 10 To 64-Bit Win...
      • $$$ Bug Bounty $$$
      • DOWNLOAD BLACK STEALER V2.1 FULL
      • Administración Remota De Servidores Desde Android
      • Inshackle - Instagram Hacks: Track Unfollowers, In...
      • Learning Web Pentesting With DVWA Part 4: XSS (Cro...
      • OnionDuke Samples
    • ►  May (51)
    • ►  April (67)
    • ►  March (15)
    • ►  February (9)
  • ►  2019 (1161)
    • ►  December (12)
    • ►  November (79)
    • ►  September (201)
    • ►  August (313)
    • ►  July (299)
    • ►  June (198)
    • ►  May (44)
    • ►  April (3)
    • ►  March (12)
  • ►  2018 (3)
    • ►  June (3)
  • ►  2015 (2)
    • ►  September (1)
    • ►  April (1)
  • ►  2008 (11)
    • ►  July (1)
    • ►  June (3)
    • ►  May (7)

Contributors

  • Amit
  • Confluence