skip to main | skip to sidebar

Purple Violet Splash

Friday, April 24, 2020

Bypass Hardware Firewalls

This is just a collection of links about my DEF CON 22 presentation, and the two tools I released:

Slides:
http://www.slideshare.net/bz98/defcon-22-bypass-firewalls-application-white-lists-secure-remote-desktops-in-20-seconds

Tools:
https://github.com/MRGEffitas/Write-into-screen
https://github.com/MRGEffitas/hwfwbypass

Presentation video from Hacktivity:
https://www.youtube.com/watch?v=KPJBckmhtZ8

Technical blog post:
https://blog.mrg-effitas.com/bypass-hardware-firewalls-def-con-22/

Have fun!




Related links

  1. Hacking Definition
  2. Hacking Web Sql Injection Pdf
  3. IngenierĂ­a Social El Arte Del Hacking Personal
  4. Como Convertirse En Hacker
  5. Hacking Live
  6. Que Hace Un Hacker
  7. Hacking Web Sql Injection Pdf
  8. Hacking Usb
  9. Codigo Hacker
  10. Social Hacking
Posted by Purple Violets at 11:14 PM

No comments:

Post a Comment

Newer Post Older Post Home
Subscribe to: Post Comments (Atom)

About Me

My photo
Purple Violets
Hi, Im 23, and I live in Mumbai, India. Each day is a new misadventure and I am trying to make sense of where I am headed. Purple Violets is my blog.
View my complete profile

Blog Archive

  • ►  2025 (54)
    • ►  July (2)
    • ►  June (1)
    • ►  May (3)
    • ►  April (3)
    • ►  March (6)
    • ►  February (6)
    • ►  January (33)
  • ►  2024 (55)
    • ►  December (1)
    • ►  November (1)
    • ►  October (2)
    • ►  September (1)
    • ►  June (1)
    • ►  May (1)
    • ►  March (2)
    • ►  February (7)
    • ►  January (39)
  • ►  2023 (77)
    • ►  November (2)
    • ►  October (2)
    • ►  September (1)
    • ►  August (7)
    • ►  July (6)
    • ►  June (28)
    • ►  May (30)
    • ►  March (1)
  • ►  2022 (7)
    • ►  December (1)
    • ►  August (2)
    • ►  May (1)
    • ►  April (1)
    • ►  January (2)
  • ►  2021 (18)
    • ►  December (2)
    • ►  November (1)
    • ►  September (1)
    • ►  August (2)
    • ►  July (1)
    • ►  May (1)
    • ►  April (3)
    • ►  March (3)
    • ►  February (2)
    • ►  January (2)
  • ▼  2020 (391)
    • ►  December (6)
    • ►  November (3)
    • ►  October (2)
    • ►  September (8)
    • ►  August (102)
    • ►  July (109)
    • ►  June (35)
    • ►  May (61)
    • ▼  April (41)
      • DOS (Denial Of Service) Attack Tutorial Ping Of De...
      • Chinese Hackers Using New iPhone Hack To Spy On Uy...
      • ASIS CTF Quals 2015 - Sawthis Writeup - Srand Remo...
      • TYPES OF HACKING
      • goGetBucket - A Penetration Testing Tool To Enumer...
      • Bypass Hardware Firewalls
      • DOWNLOAD SENTRY MBA V1.4.1 – AUTOMATED ACCOUNT CRA...
      • Lk Scraper - An Fully Configurable Linkedin Scrape...
      • Grok-backdoor - Backdoor With Ngrok Tunnel Support
      • Diggy - Extract Enpoints From APK Files
      • wpCrack - Wordpress Hash Cracker
      • Learning Web Pentesting With DVWA Part 6: File Inc...
      • July 2019 Connector
      • The Curious Case Of The Ninjamonkeypiratelaser Bac...
      • DDE Command Execution Malware Samples
      • DarkFly Tool V4.0 | 500 Tools | Termux
      • DOWNLOAD XSSTRIKE – ADVANCED XSS EXPLOITATION SUITE
      • CEH: Gathering Network And Host Information, Types...
      • TYPES OF HACKING
      • DOWNLOAD COWPATTY WIFI PASSOWORD CRACKING TOOL
      • 49 New Google Chrome Extensions Caught Hijacking C...
      • DOWNLOAD XSSTRIKE – ADVANCED XSS EXPLOITATION SUITE
      • What Is Brave Browser And How Does It Compares To ...
      • WHO IS ETHICAL HACKER
      • Insecurities Of WhatsApp's, Signal's, And Threema'...
      • Wirelurker For OSX, iOS (Part I) And Windows (Part...
      • ShellShock Payload Sample Linux.Bashlet
      • LSASS Dumping Methods ( For Mimikatz )
      • Reversing C++ String And QString
      • Hacking Everything With RF And Software Defined Ra...
      • Linux Command Line Hackery Series: Part 1
      • Printer Security
      • Osueta: A Simple Python Script To Exploit The Open...
      • How To Build A "Burner Device" For DEF CON In One ...
      • HACK SNAPCHAT ACCOUNT BY MAC SPOOFING
      • Linux/AirDropBot Samples
      • How To Unlock Forgot Pattern Password In Android P...
      • Google And Apple Plan To Turn Phones Into COVID-19...
      • Rootkit Umbreon / Umreon - X86, ARM Samples
      • People Behind The Meeples - Episode 209: Alex Wolf
      • CA 283, Z-Tack!
    • ►  March (15)
    • ►  February (9)
  • ►  2019 (1086)
    • ►  December (20)
    • ►  November (59)
    • ►  September (174)
    • ►  August (271)
    • ►  July (290)
    • ►  June (211)
    • ►  May (46)
    • ►  April (3)
    • ►  March (12)
  • ►  2018 (2)
    • ►  June (2)
  • ►  2016 (1)
    • ►  July (1)
  • ►  2013 (3)
    • ►  February (1)
    • ►  January (2)
  • ►  2012 (3)
    • ►  October (3)
  • ►  2009 (12)
    • ►  November (2)
    • ►  October (1)
    • ►  September (1)
    • ►  August (1)
    • ►  June (1)
    • ►  March (2)
    • ►  January (4)
  • ►  2008 (2)
    • ►  December (2)
 

My Blog List

  • these pants of mine... are always silent.
    Any questions, Jerry?
    2 weeks ago
  • No Way
    Legos in the Afternoon
    11 years ago
  • ...in a whiz
    Tres Leches Lemon Cake
    13 years ago
  • B’s Life in China
    Test
    13 years ago