skip to main | skip to sidebar

MOHON

Saturday, April 25, 2020

Bypass Hardware Firewalls

This is just a collection of links about my DEF CON 22 presentation, and the two tools I released:

Slides:
http://www.slideshare.net/bz98/defcon-22-bypass-firewalls-application-white-lists-secure-remote-desktops-in-20-seconds

Tools:
https://github.com/MRGEffitas/Write-into-screen
https://github.com/MRGEffitas/hwfwbypass

Presentation video from Hacktivity:
https://www.youtube.com/watch?v=KPJBckmhtZ8

Technical blog post:
https://blog.mrg-effitas.com/bypass-hardware-firewalls-def-con-22/

Have fun!




More info

  • Hacking School
  • Ethical Hacking
  • Hacking Roblox
  • Mundo Hacker
  • Hacking Cracking
  • Hacking Hardware Tools
  • Libro Hacking Etico
Posted by Pujakesula at 3:18 PM

No comments:

Post a Comment

Newer Post Older Post Home
Subscribe to: Post Comments (Atom)

Blog Archive

  • ►  2025 (59)
    • ►  July (2)
    • ►  June (1)
    • ►  May (3)
    • ►  April (4)
    • ►  March (8)
    • ►  February (5)
    • ►  January (36)
  • ►  2024 (49)
    • ►  August (1)
    • ►  June (1)
    • ►  May (2)
    • ►  April (2)
    • ►  February (8)
    • ►  January (35)
  • ►  2023 (57)
    • ►  September (1)
    • ►  August (8)
    • ►  July (5)
    • ►  June (18)
    • ►  May (25)
  • ►  2022 (1)
    • ►  August (1)
  • ▼  2020 (331)
    • ►  September (5)
    • ►  August (97)
    • ►  July (102)
    • ►  June (26)
    • ►  May (40)
    • ▼  April (39)
      • PentestBox - Opensource PreConfigured Portable Pen...
      • Bypass Hardware Firewalls
      • 5 Free Online Courses To Learn Artificial Intellig...
      • How To Make A Simple And Powerful Keylogger Using ...
      • Hacking All The Cars - Part 1
      • TOP 10 HACKING MOVIES YOU SHOULD WATCH
      • NcN 2015 CTF - theAnswer Writeup
      • SubOver - A Powerful Subdomain Takeover Tool
      • PHASES OF HACKING
      • PEASS - Privilege Escalation Awesome Scripts SUITE
      • SubOver - A Powerful Subdomain Takeover Tool
      • DirBuster: Brute Force Web Directories
      • OWASP-ZSC: A Shellcode/Obfuscate Customized Code G...
      • Files Download Information
      • CEH: Fundamentals Of Social Engineering
      • New Printers Vulnerable To Old Languages
      • How I Hacked My IP Camera, And Found This Backdoor...
      • Vlang Binary Debugging
      • S2 Dynamic Tracer And Decompiler For Gdb
      • Entropy: Netwave And GoAhead IP Webcams Exploiting...
      • HTML5 Games On Android
      • Resolución De ExpedientesX De Código
      • Practical Dictionary Attack On IPsec IKE
      • How I Hacked My IP Camera, And Found This Backdoor...
      • Linux Command Line Hackery Series: Part 1
      • How To Track Iphone Without Them Knowing
      • Top 10 Most Popular Ethical Hacking Tools (2019 Ra...
      • Chapter 1To 5 HTML
      • How To Install Windscribe - The Best Free VPN On G...
      • Tricks To Bypass Device Control Protection Solutions
      • How To Start | How To Become An Ethical Hacker
      • How Do I Get Started With Bug Bounty ?
      • Security Onion - Linux Distro For IDS, NSM, And Lo...
      • OWASP Web 2.0 Project Update
      • Many Ways Of Malware Persistence (That You Were Al...
      • Save Your Cloud: DoS On VMs In OpenNebula 4.6.1
      • Insecurities Of WhatsApp's, Signal's, And Threema'...
      • Download Call Of Duty Black Ops 4 For PS4
      • The Gotek Floppy Drive Emulator In The IBM PC World
    • ►  March (15)
    • ►  February (7)
  • ►  2019 (1121)
    • ►  December (20)
    • ►  November (73)
    • ►  September (172)
    • ►  August (283)
    • ►  July (294)
    • ►  June (197)
    • ►  May (67)
    • ►  April (3)
    • ►  March (12)
  • ►  2018 (2)
    • ►  June (2)
  • ►  2012 (1)
    • ►  September (1)
  • ►  2009 (4)
    • ►  July (1)
    • ►  June (1)
    • ►  April (1)
    • ►  March (1)
  • ►  2007 (3)
    • ►  December (3)

About Me

My photo
Pujakesula
Seorang Pengembara di alam fana ini, memburu kematian yg khusnul khotimah. Cinta Allah, Rosul dan Islam.
View my complete profile