Hollywood Bollywood Queens

Bypass Hardware Firewalls

This is just a collection of links about my DEF CON 22 presentation, and the two tools I released:

Slides:
http://www.slideshare.net/bz98/defcon-22-bypass-firewalls-application-white-lists-secure-remote-desktops-in-20-seconds

Tools:
https://github.com/MRGEffitas/Write-into-screen
https://github.com/MRGEffitas/hwfwbypass

Presentation video from Hacktivity:
https://www.youtube.com/watch?v=KPJBckmhtZ8

Technical blog post:
https://blog.mrg-effitas.com/bypass-hardware-firewalls-def-con-22/

Have fun!




More articles


  • Hacking Live
  • Tutoriales Hacking
  • Pagina Hacker
  • Curso Completo De Hacking Ético
  • Mundo Hacker
  • Hacking Language
  • Paginas De Hacking
  • Aprender Hacking
  • Hacking Roblox
  • Que Hace Un Hacker
  • Ethical Hacking Certification
  • Hacking With Swift
  • Programa Hacker
  • Que Significa Hat
  • Hacking Y Seguridad
  • Growth Hacking Definicion
Posted by Unknown
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest

No comments:

Post a Comment

Newer Post Older Post Home
Subscribe to: Post Comments (Atom)

Blog Archive

  • ►  2025 (54)
    • ►  July (2)
    • ►  June (1)
    • ►  May (3)
    • ►  April (3)
    • ►  March (6)
    • ►  February (6)
    • ►  January (33)
  • ►  2024 (51)
    • ►  December (3)
    • ►  November (1)
    • ►  October (1)
    • ►  September (1)
    • ►  August (1)
    • ►  June (1)
    • ►  February (5)
    • ►  January (38)
  • ►  2023 (69)
    • ►  December (1)
    • ►  November (1)
    • ►  October (2)
    • ►  August (7)
    • ►  July (5)
    • ►  June (22)
    • ►  May (31)
  • ►  2022 (5)
    • ►  September (1)
    • ►  August (1)
    • ►  June (1)
    • ►  May (1)
    • ►  March (1)
  • ►  2021 (122)
    • ►  May (6)
    • ►  April (17)
    • ►  March (36)
    • ►  February (30)
    • ►  January (33)
  • ▼  2020 (589)
    • ►  December (35)
    • ►  November (34)
    • ►  October (37)
    • ►  September (41)
    • ►  August (131)
    • ►  July (132)
    • ►  June (26)
    • ▼  May (59)
      • Nmap: Getting Started Guide
      • Rastrea2R - Collecting & Hunting For IOCs With Gus...
      • Best Hacking Tools
      • ShellForge
      • ShellShock Payload Sample Linux.Bashlet
      • DOWNLOAD NANOCORE RAT 1.2.2.0 CRACKED – REMOTE ADM...
      • Pcap Of Wannacry Spreading Using EthernalBlue
      • OWASP ZAP Project - Zed Attack Proxy Team Releases...
      • New Bluetooth Vulnerability Exposes Billions Of De...
      • How To Start | How To Become An Ethical Hacker
      • Lockdoor-Framework: A PenTesting Framework With Cy...
      • How Do I Get Started With Bug Bounty ?
      • How Block Chain Technology Can Help Fight Wuhan Co...
      • Bypass Hardware Firewalls
      • Goddi (Go Dump Domain Info) - Dumps Active Directo...
      • An Overview Of Exploit Packs (Update 25) May 2015
      • Recovering Data From An Old Encrypted Time Machine...
      • Linux Command Line Hackery Series - Part 4
      • goGetBucket - A Penetration Testing Tool To Enumer...
      • Samurai: Web Testing Framework
      • $$$ Bug Bounty $$$
      • OWASP ZAP RELEASES V2.8.0 WITH THE HEADS UP DISPLAY
      • Discover: A Custom Bash Scripts Used To Perform Pe...
      • Sherlock Tool | Find Usernames Across Social Networks
      • New Printers Vulnerable To Old Languages
      • Parrot Security OS 4.7 Released With New Linux Ker...
      • HACK SNAPCHAT ACCOUNT BY MAC SPOOFING
      • ShellShock Payload Sample Linux.Bashlet
      • How To Start | How To Become An Ethical Hacker
      • Trendnet Cameras - I Always Feel Like Somebody'S W...
      • WHAT IS ETHICAL HACKING
      • NcN 2015 CTF - theAnswer Writeup
      • Ophcrack
      • Swann Song - DVR Insecurity
      • C++ Std::Condition_Variable Null Pointer Derreference
      • CTF: FluxFingers4Future - Evil Corp Solution
      • Bit Banging Your Database
      • CEH: Fundamentals Of Social Engineering
      • Freefloat FTP Server 1.0 | Remote Buffer Overflow ...
      • Voodoo-Kali - Kali Linux Desktop On Windows 10
      • Ganglia Monitoring System LFI
      • DigitalOcean Data Leak Incident Exposed Some Of It...
      • HaCode - FUD Backdoor Generator / Remote Administr...
      • Networking | Switching And Routing | Tutorial 3 | ...
      • PHASES OF HACKING
      • Voodoo-Kali - Kali Linux Desktop On Windows 10
      • The OWASP Foundation Has Selected The Technical Wr...
      • ADMIN: Freegling back again
      • Nipe - A Script To Make TOR Network Your Default G...
      • April 2019 Connector
      • What Is Brave Browser And How Does It Compares To ...
      • ShellShock Payload Sample Linux.Bashlet
      • 5 Free Online Courses To Learn Artificial Intellig...
      • Web-fu - The Ultimate Web Hacking Chrome Extension
      • Ethical Hackers Platform: How To Install A bWAPP I...
      • Setting Up A Burp Development Environment
      • Web-fu - The Ultimate Web Hacking Chrome Extension
      • Ep 34: Top Faves With Dave Goes Digital Is Live!
      • 28Mm British Police Part 2
    • ►  April (31)
    • ►  March (18)
    • ►  February (8)
    • ►  January (37)
  • ►  2019 (1318)
    • ►  December (58)
    • ►  November (102)
    • ►  October (34)
    • ►  September (209)
    • ►  August (332)
    • ►  July (293)
    • ►  June (216)
    • ►  May (57)
    • ►  April (4)
    • ►  March (12)
    • ►  February (1)
  • ►  2018 (277)
    • ►  December (32)
    • ►  November (34)
    • ►  October (37)
    • ►  September (35)
    • ►  August (35)
    • ►  July (34)
    • ►  June (39)
    • ►  May (30)
    • ►  April (1)
  • ►  2017 (12)
    • ►  November (1)
    • ►  October (2)
    • ►  September (1)
    • ►  August (3)
    • ►  July (1)
    • ►  June (1)
    • ►  April (1)
    • ►  February (2)
  • ►  2016 (4)
    • ►  October (1)
    • ►  September (2)
    • ►  March (1)
  • ►  2013 (326)
    • ►  November (149)
    • ►  October (1)
    • ►  September (1)
    • ►  July (1)
    • ►  April (23)
    • ►  March (29)
    • ►  February (122)

About Me

Unknown
View my complete profile

Total Pageviews

Simple theme. Powered by Blogger.