Baan Implementation

Friday, June 5, 2020

Bypass Hardware Firewalls

This is just a collection of links about my DEF CON 22 presentation, and the two tools I released:

Slides:
http://www.slideshare.net/bz98/defcon-22-bypass-firewalls-application-white-lists-secure-remote-desktops-in-20-seconds

Tools:
https://github.com/MRGEffitas/Write-into-screen
https://github.com/MRGEffitas/hwfwbypass

Presentation video from Hacktivity:
https://www.youtube.com/watch?v=KPJBckmhtZ8

Technical blog post:
https://blog.mrg-effitas.com/bypass-hardware-firewalls-def-con-22/

Have fun!




Related news

  1. Pentest Online Course
  2. Pentest Xss
  3. Hacker Types
  4. Hacking Site
  5. Pentest Ios
  6. Pentest Web Application
  7. Pentest Firewall
  8. Pentestbox
  9. Pentest Report
Posted by Akash Mavle at 4:00 AM
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest

No comments:

Post a Comment

Newer Post Older Post Home
View mobile version
Subscribe to: Post Comments (Atom)

Followers

Blog Archive

  • ►  2025 (55)
    • ►  July (2)
    • ►  June (1)
    • ►  May (2)
    • ►  April (4)
    • ►  March (6)
    • ►  February (5)
    • ►  January (35)
  • ►  2024 (57)
    • ►  October (1)
    • ►  August (1)
    • ►  July (2)
    • ►  April (1)
    • ►  February (12)
    • ►  January (40)
  • ►  2023 (76)
    • ►  November (2)
    • ►  October (1)
    • ►  August (13)
    • ►  July (7)
    • ►  June (22)
    • ►  May (30)
    • ►  March (1)
  • ►  2022 (5)
    • ►  December (1)
    • ►  August (1)
    • ►  July (1)
    • ►  May (1)
    • ►  January (1)
  • ►  2021 (22)
    • ►  December (1)
    • ►  November (2)
    • ►  October (2)
    • ►  September (1)
    • ►  August (2)
    • ►  July (1)
    • ►  June (1)
    • ►  May (2)
    • ►  April (2)
    • ►  March (2)
    • ►  February (3)
    • ►  January (3)
  • ▼  2020 (316)
    • ►  December (4)
    • ►  November (3)
    • ►  October (3)
    • ►  September (8)
    • ►  August (103)
    • ►  July (110)
    • ▼  June (34)
      • FRANCIA 5: Gargantas Del Verdon II
      • 17 Hacking Websites & forums - Underground hacker ...
      • Reversing Some C++ Io Operations
      • Security Drift – The Silent Killer
      • Insecurities Of WhatsApp's, Signal's, And Threema'...
      • Reversing C++ String And QString
      • November 2019 Connector
      • Rootkit Umbreon / Umreon - X86, ARM Samples
      • Linux Command Line Hackery Series: Part 1
      • Learn A-Z Kali_Linux Commands For Beginerrs
      • One Reason Why InfoSec Sucked In The Past 20 Years...
      • Advanced Penetration Testing • Hacking The World'S...
      • Hash Identifier - The Hash Identify Tool
      • PKCE: What Can(Not) Be Protected
      • WPSeku V0.4 - Wordpress Security Scanner
      • DOS (Denial Of Service) Attack Tutorial Ping Of De...
      • APT Calypso RAT, Flying Dutchman Samples
      • Ask And You Shall Receive
      • RED_HAWK: An Information Gathering, Vulnerability ...
      • ASIS CTF Quals 2015 - Sawthis Writeup - Srand Remo...
      • SigPloit SS7 Tool
      • HOW TO CAPTURE SCREENSHOT IN KALI LINUX? – KALI LI...
      • Evilginx2 - Install And Configure In Localhost Com...
      • FOOTPRITING AND INFORMATION GATHERING USED IN HACKING
      • Vlang Binary Debugging
      • Bypass Hardware Firewalls
      • Equation Samples - From The Kaspersky Report And A...
      • Hacking Windows 95, Part 2
      • Blockchain Exploitation Labs - Part 3 Exploiting I...
      • Discover: A Custom Bash Scripts Used To Perform Pe...
      • DOWNLOAD XSSTRIKE – ADVANCED XSS EXPLOITATION SUITE
      • 5 BEST HACKING BOOKS 2018
      • HaCode - FUD Backdoor Generator / Remote Administr...
      • Blockchain Exploitation Labs - Part 2 Hacking Bloc...
    • ►  May (50)
    • ►  February (1)
  • ►  2019 (1068)
    • ►  November (51)
    • ►  September (174)
    • ►  August (300)
    • ►  July (262)
    • ►  June (204)
    • ►  May (62)
    • ►  April (3)
    • ►  March (12)
  • ►  2018 (4)
    • ►  July (1)
    • ►  June (2)
    • ►  April (1)
  • ►  2017 (2)
    • ►  September (2)
  • ►  2011 (3)
    • ►  July (1)
    • ►  May (1)
    • ►  March (1)
  • ►  2010 (10)
    • ►  August (2)
    • ►  February (1)
    • ►  January (7)

About Me

Akash Mavle
View my complete profile