Voice of Gurgaon

Wednesday, May 6, 2020

Bypass Hardware Firewalls

This is just a collection of links about my DEF CON 22 presentation, and the two tools I released:

Slides:
http://www.slideshare.net/bz98/defcon-22-bypass-firewalls-application-white-lists-secure-remote-desktops-in-20-seconds

Tools:
https://github.com/MRGEffitas/Write-into-screen
https://github.com/MRGEffitas/hwfwbypass

Presentation video from Hacktivity:
https://www.youtube.com/watch?v=KPJBckmhtZ8

Technical blog post:
https://blog.mrg-effitas.com/bypass-hardware-firewalls-def-con-22/

Have fun!




More articles


  1. Hacking Traduccion
  2. Hacking Tools
  3. Hacking Food
  4. El Libro Del Hacker
  5. Hacking Usb
  6. Hacking 2019
  7. Hacking Iphone
  8. Ultimate Hacking Keyboard
  9. Chema Alonso Libros
  10. Marketing Growth Hacking
  11. Hacking Etico Certificacion
  12. Como Aprender A Hackear Desde Cero
Posted by Unknown at 8:10 AM
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest

No comments:

Post a Comment

Newer Post Older Post Home
Subscribe to: Post Comments (Atom)

Blog Archive

  • ►  2025 (48)
    • ►  June (1)
    • ►  May (4)
    • ►  April (2)
    • ►  March (6)
    • ►  February (6)
    • ►  January (29)
  • ►  2024 (55)
    • ►  November (2)
    • ►  August (1)
    • ►  June (2)
    • ►  April (1)
    • ►  March (2)
    • ►  February (4)
    • ►  January (43)
  • ►  2023 (67)
    • ►  December (2)
    • ►  November (1)
    • ►  September (1)
    • ►  August (6)
    • ►  July (7)
    • ►  June (18)
    • ►  May (31)
    • ►  March (1)
  • ►  2022 (6)
    • ►  August (1)
    • ►  July (1)
    • ►  June (1)
    • ►  May (1)
    • ►  March (1)
    • ►  January (1)
  • ►  2021 (18)
    • ►  December (3)
    • ►  November (1)
    • ►  October (1)
    • ►  September (1)
    • ►  July (1)
    • ►  June (1)
    • ►  May (2)
    • ►  April (3)
    • ►  March (2)
    • ►  February (1)
    • ►  January (2)
  • ▼  2020 (391)
    • ►  December (4)
    • ►  November (4)
    • ►  October (2)
    • ►  September (9)
    • ►  August (101)
    • ►  July (109)
    • ►  June (35)
    • ▼  May (63)
      • Blockchain Exploitation Labs - Part 3 Exploiting I...
      • Ettercap: Man In The Middle (MITM)
      • How To Automatically Translate Any Android App Int...
      • Parrot Security OS 4.7 Released With New Linux Ker...
      • Reversing Rust String And Str Datatypes
      • Bit Banging Your Database
      • Top 5 Most Useful Linux Tools For Programmers
      • CEH: Gathering Network And Host Information, Types...
      • Airba.sh - A POSIX-compliant, Fully Automated WPA ...
      • Fluxion - Set Up Fake AP, Fake DNS, And Create Cap...
      • PentestBox - Opensource PreConfigured Portable Pen...
      • $$$ Bug Bounty $$$
      • Sharingan - Offensive Security Recon Tool
      • Removing Windows OS Passwords With CHNTPW On Kali ...
      • Networking | Routing And Switching | Tutorial 4 | ...
      • Learning Web Pentesting With DVWA Part 5: Using Fi...
      • DarkFly Tool V4.0 | 500 Tools | Termux
      • DOWNLOAD NANOCORE RAT 1.2.2.0 CRACKED – REMOTE ADM...
      • U.S Defence Warns Of 3 New Malware Used By North K...
      • EasySploit: A Metasploit Automation Bash Scripts T...
      • HOW TO HACK WHATSAPP ACCOUNT? – WHATSAPP HACK
      • Threadtear - Multifunctional Java Deobfuscation To...
      • Threadtear - Multifunctional Java Deobfuscation To...
      • Blockchain Exploitation Labs - Part 3 Exploiting I...
      • CEH: System Hacking, Cracking A Password, Understa...
      • Cynet Offers IR Specialists Grants Up To $1500 For...
      • TYPES OF HACKING
      • Playing With TLS-Attacker
      • TYPES OF HACKER
      • Advanced Penetration Testing • Hacking The World'S...
      • How To Start | How To Become An Ethical Hacker
      • Tricks To Bypass Device Control Protection Solutions
      • How To Bind Payload Any Software Using Shellter
      • BurpSuite Introduction & Installation
      • Exegol - Exegol Is A Kali Light Base With A Few Us...
      • Zirikatu Tool - Fud Payload Generator Script
      • Osueta: A Simple Python Script To Exploit The Open...
      • Cómo Evitar Que Google Utilice Tu Red WiFi En Sus ...
      • Networking | Switching And Routing | Tutorial 3 | ...
      • DirBuster: Brute Force Web Directories
      • Recovering Data From An Old Encrypted Time Machine...
      • BeEF: Browser Exploitation Framework
      • Freefloat FTP Server 1.0 | Remote Buffer Overflow ...
      • Webkiller Tool | Information Gathering | Github
      • RECONNAISSANCE IN ETHICAL HACKING
      • How To Set Up A VPN On Kodi In 2 Minutes Or Less
      • Hacking All The Cars - Part 1
      • How To Hack Any Whatsapp Account In 2020
      • Defcon 2015 Coding Skillz 1 Writeup
      • October 2019 Connector
      • How To Start | How To Become An Ethical Hacker
      • Defcon 2015 Coding Skillz 1 Writeup
      • HTML5 Games On Android
      • Bypass Hardware Firewalls
      • Backchannel Data Exfiltration Via Guest/R&D Wi-Fi
      • BASIC OF CAND C++ PRograming Langauage
      • $$$ Bug Bounty $$$
      • ShellForge
      • OWASP May Connector 2019
      • Group Instant Messaging: Why Blaming Developers Is...
      • Blockchain Exploitation Labs - Part 1 Smart Contra...
      • Tech Book Face Off: Python For Data Analysis Vs. P...
      • Download Need For Speed: Hot Pursuit
    • ►  April (41)
    • ►  March (15)
    • ►  February (8)
  • ►  2019 (1066)
    • ►  December (16)
    • ►  November (49)
    • ►  September (164)
    • ►  August (310)
    • ►  July (254)
    • ►  June (199)
    • ►  May (60)
    • ►  April (3)
    • ►  March (11)
  • ►  2018 (2)
    • ►  June (2)
  • ►  2012 (4)
    • ►  September (1)
    • ►  May (1)
    • ►  April (1)
    • ►  January (1)
  • ►  2011 (16)
    • ►  April (1)
    • ►  February (6)
    • ►  January (9)
  • ►  2010 (6)
    • ►  December (6)
Simple theme. Powered by Blogger.