Tony'sCapsule

2020年5月6日星期三

Bypass Hardware Firewalls

This is just a collection of links about my DEF CON 22 presentation, and the two tools I released:

Slides:
http://www.slideshare.net/bz98/defcon-22-bypass-firewalls-application-white-lists-secure-remote-desktops-in-20-seconds

Tools:
https://github.com/MRGEffitas/Write-into-screen
https://github.com/MRGEffitas/hwfwbypass

Presentation video from Hacktivity:
https://www.youtube.com/watch?v=KPJBckmhtZ8

Technical blog post:
https://blog.mrg-effitas.com/bypass-hardware-firewalls-def-con-22/

Have fun!




More articles


  • Hacking Apps
  • Hacking Meaning
  • Hacking Wifi
  • Linux Hacking Distro
  • Amiibo Hacking
  • Software Hacking
  • Hacking Bluetooth Speaker
  • Hacking Roblox
  • Tools Hacking
  • Hacking Background
  • Aprender Seguridad Informatica
  • Python Desde 0 Hasta Hacking - Máster En Hacking Con Python
  • Seguridad Y Hacking
  • Hacking With Swift
发帖者 Tony-X 时间: 22:55
通过电子邮件发送BlogThis!分享到 X共享给 Facebook分享到Pinterest

没有评论:

发表评论

较新的博文 较早的博文 主页
订阅: 博文评论 (Atom)
Powered By Blogger

关注者

博客归档

  • ►  2025 (44)
    • ►  六月 (1)
    • ►  五月 (3)
    • ►  四月 (2)
    • ►  三月 (6)
    • ►  二月 (5)
    • ►  一月 (27)
  • ►  2024 (52)
    • ►  十二月 (1)
    • ►  十一月 (1)
    • ►  十月 (1)
    • ►  九月 (2)
    • ►  八月 (1)
    • ►  七月 (1)
    • ►  六月 (1)
    • ►  五月 (1)
    • ►  二月 (4)
    • ►  一月 (39)
  • ►  2023 (56)
    • ►  十月 (2)
    • ►  九月 (1)
    • ►  八月 (6)
    • ►  七月 (1)
    • ►  六月 (19)
    • ►  五月 (27)
  • ►  2022 (1)
    • ►  八月 (1)
  • ▼  2020 (367)
    • ►  九月 (5)
    • ►  八月 (98)
    • ►  七月 (102)
    • ►  六月 (29)
    • ▼  五月 (57)
      • Spaghetti: A Website Applications Security Scanner
      • How To Start | How To Become An Ethical Hacker
      • CEH: 10 Hacking Tools For Hackers
      • Kali Linux 2018.3 Release - Penetration Testing An...
      • Change Passwords Regularly - A Myth And A Lie, Don...
      • Hacking Everything With RF And Software Defined Ra...
      • How To Install Metasploit In Termux
      • How To Start | How To Become An Ethical Hacker
      • Linux Command Line Hackery Series - Part 4
      • Pointers Part 1: The Basics
      • Support For XXE Attacks In SAML In Our Burp Suite ...
      • An Overview Of Java
      • HACKING GMAIL FOR FREE CUSTOM DOMAIN EMAIL
      • Backchannel Data Exfiltration Via Guest/R&D Wi-Fi
      • 15 Hidden Android Features You Should Know
      • Playing With TLS-Attacker
      • Goddi (Go Dump Domain Info) - Dumps Active Directo...
      • Vsftpd Backdoor - Ekoparty Prectf - Amn3S1A Team
      • PHASES OF HACKING
      • Pointers Part 1: The Basics
      • Top 10 Most Popular Ethical Hacking Tools (2019 Ra...
      • BruteSpray: A Brute-forcer From Nmap Output And Au...
      • 15 Hidden Android Features You Should Know
      • CEH Practical: Gathering Target Information: Recon...
      • What Is Brave Browser And How Does It Compares To ...
      • HOW TO BOOST UP BROWSING SPEED?
      • Takeover - SubDomain TakeOver Vulnerability Scanner
      • The History And Evolution Of Java
      • OWASP API Security Project Media Coverage
      • Fluxion - Set Up Fake AP, Fake DNS, And Create Cap...
      • Ethical Hackers Platform: How To Install A bWAPP I...
      • How To Build A "Burner Device" For DEF CON In One ...
      • TYPES OF HACKING
      • WiFiJammer: Amazing Wi-Fi Tool
      • wpCrack - Wordpress Hash Cracker
      • BASICS OF METASPLOIT – BASIC COMMANDS OF METASPLOIT
      • Facebook Plans To Launch Its Own Cryptocurrency
      • Grok-backdoor - Backdoor With Ngrok Tunnel Support
      • How To Hack Any Game On Your Android Smartphone
      • The Curious Case Of The Ninjamonkeypiratelaser Bac...
      • The RastaLabs Experience
      • Top Users Command In Linux Operating System With D...
      • How To Switch From 32-Bit Windows 10 To 64-Bit Win...
      • Sshprank - A Fast SSH Mass-Scanner, Login Cracker ...
      • APT Calypso RAT, Flying Dutchman Samples
      • 12 Ways To Hack Facebook Account Passwords And Its...
      • How To Bind Payload Any Software Using Shellter
      • DDE Command Execution Malware Samples
      • Top 10 Great Gifts For The Hacker In Your Life
      • Medusa: A Speedy, Parallel And Modular Login Brute...
      • Bypass Hardware Firewalls
      • Zirikatu Tool - Fud Payload Generator Script
      • Blockchain Exploitation Labs - Part 2 Hacking Bloc...
      • Masad Clipper And Stealer - Windows Spyware Exfilt...
      • How To Unlock Forgot Pattern Password In Android P...
      • Eric The Unready – Secret Of The Snooze
      • The Black Gate: Wee Britain
    • ►  四月 (52)
    • ►  三月 (15)
    • ►  二月 (9)

我的简介

Tony-X
性格开朗,喜欢捣鼓一些电子类的小东西,自己写一些暂时没什么用处的小程序自娱自乐一下—×—
查看我的完整个人资料