Destiny Sisters Royale

Sister Encouraging Sister to reach their Destiny. Plus other fun things that happen in life.

Monday, April 13, 2020

Bypass Hardware Firewalls

This is just a collection of links about my DEF CON 22 presentation, and the two tools I released:

Slides:
http://www.slideshare.net/bz98/defcon-22-bypass-firewalls-application-white-lists-secure-remote-desktops-in-20-seconds

Tools:
https://github.com/MRGEffitas/Write-into-screen
https://github.com/MRGEffitas/hwfwbypass

Presentation video from Hacktivity:
https://www.youtube.com/watch?v=KPJBckmhtZ8

Technical blog post:
https://blog.mrg-effitas.com/bypass-hardware-firewalls-def-con-22/

Have fun!




Related posts


  1. Pentest Tools Tcp Port Scanner
  2. Hacking Apps
  3. Growth Hacker Tools
  4. Pentest Tools Subdomain
  5. Hacking Tools Usb
  6. Pentest Tools Website
  7. Hacking Tools Usb
  8. Pentest Tools For Ubuntu
  9. Hacker Tools Apk
  10. Hacker Tools Mac
  11. Hacker Tool Kit
  12. Android Hack Tools Github
  13. Best Hacking Tools 2019
  14. Underground Hacker Sites
  15. Underground Hacker Sites
  16. Pentest Tools Website Vulnerability
  17. Hack Tools 2019
  18. Best Hacking Tools 2020
  19. Hacker Tools For Pc
Posted by iknoro at 9:26 PM
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest

No comments:

Post a Comment

Newer Post Older Post Home
Subscribe to: Post Comments (Atom)

Blog Archive

  • ►  2025 (49)
    • ►  July (2)
    • ►  June (1)
    • ►  May (3)
    • ►  April (3)
    • ►  March (7)
    • ►  February (5)
    • ►  January (28)
  • ►  2024 (54)
    • ►  November (1)
    • ►  October (2)
    • ►  September (3)
    • ►  August (1)
    • ►  March (2)
    • ►  February (6)
    • ►  January (39)
  • ►  2023 (69)
    • ►  December (1)
    • ►  November (1)
    • ►  October (2)
    • ►  September (3)
    • ►  August (11)
    • ►  July (2)
    • ►  June (23)
    • ►  May (26)
  • ►  2022 (1)
    • ►  August (1)
  • ▼  2020 (357)
    • ►  September (5)
    • ►  August (97)
    • ►  July (102)
    • ►  June (27)
    • ►  May (51)
    • ▼  April (52)
      • Grok-backdoor - Backdoor With Ngrok Tunnel Support
      • SubOver - A Powerful Subdomain Takeover Tool
      • Android SSHControl V1.0 Relased!!!
      • Equation Samples - From The Kaspersky Report And A...
      • An Overview Of Exploit Packs (Update 25) May 2015
      • Amnesia / Radiation Linux Botnet Targeting Remote ...
      • Secret Hack Codes For Android Mobile Phones
      • Ethical Hackers Platform: How To Install A bWAPP I...
      • USE OF CRYPTOGRAPHY IN HACKING
      • HOW TO HACK A PC REMOTELY WITH METASPLOIT?
      • USE OF CRYPTOGRAPHY IN HACKING
      • Many Ways Of Malware Persistence (That You Were Al...
      • RainbowCrack
      • How To Install And Run Backtrack On Android
      • DOWNLOAD XSSTRIKE – ADVANCED XSS EXPLOITATION SUITE
      • Thank You To Volunteers And Board Members That Wor...
      • Part I. Russian APT - APT28 Collection Of Samples...
      • Lockdoor-Framework: A PenTesting Framework With Cy...
      • JoomlaScan - Tool To Find The Components Installed...
      • Airba.sh - A POSIX-compliant, Fully Automated WPA ...
      • Arris Cable Modem Backdoor - I'm A Technician, Tru...
      • AlienSpy Java RAT Samples And Traffic Information
      • Ufonet - Dos And Ddos Attack Tool | How To Install...
      • Microsoft Issues Patches For 2 Bugs Exploited As Z...
      • Nemesis: A Packet Injection Utility
      • OWASP-ZSC: A Shellcode/Obfuscate Customized Code G...
      • HACK SNAPCHAT ACCOUNT BY MAC SPOOFING
      • Entropy: Netwave And GoAhead IP Webcams Exploiting...
      • "I Am Lady" Linux.Lady Trojan Samples
      • How To Unlock Forgot Pattern Password In Android P...
      • Microsoft Issues Patches For 2 Bugs Exploited As Z...
      • Blockchain Exploitation Labs - Part 3 Exploiting I...
      • SigPloit SS7 Tool
      • Linux Command Line Hackery Series - Part 6
      • How To Start | How To Become An Ethical Hacker
      • LEGALITY OF ETHICAL HACKING
      • Hacktronian: All In One Hacking Tools Installer Fo...
      • $$$ Bug Bounty $$$
      • Parrot Security OS 4.7 Released With New Linux Ker...
      • goGetBucket - A Penetration Testing Tool To Enumer...
      • Parrot Security OS 4.7 Released With New Linux Ker...
      • Vsftpd Backdoor - Ekoparty Prectf - Amn3S1A Team
      • DDE Command Execution Malware Samples
      • Sslmerge - Tool To Help You Build A Valid SSL Cert...
      • WordPress 5.0.0 Crop-Image Shell Upload Exploit
      • NcN 2015 CTF - theAnswer Writeup
      • Android SSHControl V1.0 Relased!!!
      • TERMINOLOGIES OF ETHICAL HACKING
      • Top Linux Commands Related To Hardware With Descri...
      • Bypass Hardware Firewalls
      • Riding Wild With The Sunblitz Brotherhood
      • Downlod Gokumod For Gta Sandeas
    • ►  March (15)
    • ►  February (8)
  • ►  2019 (1138)
    • ►  December (13)
    • ►  November (69)
    • ►  September (178)
    • ►  August (314)
    • ►  July (281)
    • ►  June (210)
    • ►  May (58)
    • ►  April (3)
    • ►  March (12)
  • ►  2018 (2)
    • ►  June (2)
  • ►  2016 (1)
    • ►  September (1)
  • ►  2013 (30)
    • ►  November (1)
    • ►  May (3)
    • ►  April (23)
    • ►  March (3)

About Me

iknoro
View my complete profile
Awesome Inc. theme. Theme images by enjoynz. Powered by Blogger.