Security Tools

/Security Tools

Week 12 In Review – 2017

Events Related BSidesSF 2017 - www.youtube.com Security BSides San Francisco is a two-day information security conference. It is a conference by the community for the community. Hackers Earns big at Pwn2Own Hackers managed to take down Microsoft Edge and escape a virtual machine to boot on the third day of Pwn2Own early Friday. Members from Qihoo’s [...]

Week 11 In Review – 2017

Events Related BSides Indy 2017 Videos - www.irongeek.com These are the videos from the BSides Indy conference.  Tools Worried about Strutshock (CVE-2017-5638)? - www.tinfoilsecurity.com Quick check to see if your website is vulnerable Techniques PlaidCTF 2012 – Traitor (200 pts) - int3pids.blogspot.com The challenge is supposed to be very straightforward, because we only have a recorded audio [...]

Week 9 In Review – 2017

Events Related RSAC 2017 - www.youtube.com RSA Conference is helping drive the information security agenda worldwide with annual industry events in the U.S., Europe and Asia. Irongeek.com - www.irongeek.com Welcome to Irongeek.com, Adrian Crenshaw's Information Security site (along with a bit about weightlifting and other things that strike my fancy).  As I write articles and [...]

Week 8 In Review – 2017

Tools  Universal Radio Hacker - github.com The Universal Radio Hacker is a software for investigating unknown wireless protocols. HackRF - github.com Techniques How to build a 8 GPU password cracker - www.shellntel.com This build doesn't require any "black magic" or hours of frustration like desktop components do. If you follow this blog and its parts [...]

February 19th, 2017|Security Tools, Security Vulnerabilities, Week in Review|1 Comment

Week 5 In Review – 2017

Resources Running guide for CTF's - gist.github.com Blackhat Hardware Training Roadmap - securinghardware.com This diagram is intended to give an overview of many of the hardware-related trainings available at Black Hat USA 2017. Generally, lower level hardware is at the bottom and more software to the top. Tools Wordpress Exploit Framework - github.com screen2root - [...]

Week 4 In Review – 2017

Events Related BSides Columbus 2017 Videos - www.irongeek.com These are the videos from the BSides Columbus Ohio conference. Resources DevOoops: Client Provisioning (Vagrant) - carnal0wnage.attackresearch.com Notes from the 2015 Devoops Talk. Vagrant used to ship with a default keypair and was difficult to rotate. Intel debugger interface open to hacking via USB - blog.ptsecurity.com New Intel processors [...]

Week 3 In Review – 2017

Tools Acunetix Free Manual Pen Testing Tools - www.acunetix.com Acunetix Manual Tools allow penetration testers to further automated testing. waveconverter - github.com Factoria Labs 2016 WaveConverter is a Python application, built on GTK+ 3. The GUI has been implemented via Glade. A sqlite database has been implemented via sqlalchemy. Techniques Cracking The 12+ Character Password [...]

Week 2 In Review – 2017

Tools Invoke-TheHash - github.com Invoke-TheHash contains PowerShell functions for performing NTLMv2 pass the hash WMI and SMB command execution. WMI and SMB services are accessed through .NET TCPClient connections. Local administrator privilege is not required client-side. FiercePhish - github.com FiercePhish is a full-fledged phishing framework to manage all phishing engagements. It allows you to track [...]

January 8th, 2017|Security Tools, Site News, Week in Review|0 Comments

Week 1 In Review – 2017

Resources 33C3: Chris Gerlinsky Cracks Pay TV - hackaday.com People who have incredible competence in a wide range of fields are rare, and it can appear deceptively simple when they present their work. [Chris Gerlinksy]’s talk on breaking the encryption used on satellite and cable pay TV set-top boxes was like that. Tools mitmproxy: release v1.0.0 - [...]

Week 50 In Review – 2016

Events Related PhreakNIC20-2016 - www.youtube.com Tools GRASSMARLIN - github.com GRASSMARLIN provides IP network situational awareness of industrial control systems (ICS) and Supervisory Control and Data Acquisition (SCADA) networks to support network security. Techniques Secure Rom extraction on iPhone 6s - ramtin-amin.fr Secure ROM, also knows as bootrom, is the very first piece of software that [...]