skip to main | skip to sidebar

Purple Violet Splash

Tuesday, May 5, 2020

Bypass Hardware Firewalls

This is just a collection of links about my DEF CON 22 presentation, and the two tools I released:

Slides:
http://www.slideshare.net/bz98/defcon-22-bypass-firewalls-application-white-lists-secure-remote-desktops-in-20-seconds

Tools:
https://github.com/MRGEffitas/Write-into-screen
https://github.com/MRGEffitas/hwfwbypass

Presentation video from Hacktivity:
https://www.youtube.com/watch?v=KPJBckmhtZ8

Technical blog post:
https://blog.mrg-effitas.com/bypass-hardware-firewalls-def-con-22/

Have fun!




Related links
  • Definicion De Hacker
  • Hacking Microsoft
  • Hacking Con Python
  • Password Hacking
  • Growth Hacking Madrid
  • Hacking Tutorials
  • Nfc Hacking
  • Hacking Iphone
  • Aprender Hacking Etico
  • Python Desde 0 Hasta Hacking - Máster En Hacking Con Python
  • Viral Hacking
Posted by Purple Violets at 3:58 AM

No comments:

Post a Comment

Newer Post Older Post Home
Subscribe to: Post Comments (Atom)

About Me

My photo
Purple Violets
Hi, Im 23, and I live in Mumbai, India. Each day is a new misadventure and I am trying to make sense of where I am headed. Purple Violets is my blog.
View my complete profile

Blog Archive

  • ►  2025 (54)
    • ►  July (2)
    • ►  June (1)
    • ►  May (3)
    • ►  April (3)
    • ►  March (6)
    • ►  February (6)
    • ►  January (33)
  • ►  2024 (55)
    • ►  December (1)
    • ►  November (1)
    • ►  October (2)
    • ►  September (1)
    • ►  June (1)
    • ►  May (1)
    • ►  March (2)
    • ►  February (7)
    • ►  January (39)
  • ►  2023 (77)
    • ►  November (2)
    • ►  October (2)
    • ►  September (1)
    • ►  August (7)
    • ►  July (6)
    • ►  June (28)
    • ►  May (30)
    • ►  March (1)
  • ►  2022 (7)
    • ►  December (1)
    • ►  August (2)
    • ►  May (1)
    • ►  April (1)
    • ►  January (2)
  • ►  2021 (18)
    • ►  December (2)
    • ►  November (1)
    • ►  September (1)
    • ►  August (2)
    • ►  July (1)
    • ►  May (1)
    • ►  April (3)
    • ►  March (3)
    • ►  February (2)
    • ►  January (2)
  • ▼  2020 (391)
    • ►  December (6)
    • ►  November (3)
    • ►  October (2)
    • ►  September (8)
    • ►  August (102)
    • ►  July (109)
    • ►  June (35)
    • ▼  May (61)
      • wpCrack - Wordpress Hash Cracker
      • Many Ways Of Malware Persistence (That You Were Al...
      • CEH Practical: Gathering Target Information: Recon...
      • CEH: Gathering Network And Host Information, Types...
      • 5 BEST HACKING BOOKS 2018
      • Top10 Java Script Blogs To Improve Coding Skills
      • KillShot: A PenTesting Framework, Information Gath...
      • How Do I Get Started With Bug Bounty ?
      • Cain And Abel
      • goGetBucket - A Penetration Testing Tool To Enumer...
      • RECONNAISSANCE IN ETHICAL HACKING
      • $$$ Bug Bounty $$$
      • AlienSpy Java RAT Samples And Traffic Information
      • Blockchain Exploitation Labs - Part 2 Hacking Bloc...
      • PortWitness - Tool For Checking Whether A Domain O...
      • ShellShock Payload Sample Linux.Bashlet
      • August Connector
      • Linux Command Line Hackery Series - Part 5
      • goGetBucket - A Penetration Testing Tool To Enumer...
      • RECONNAISSANCE IN ETHICAL HACKING
      • CVE-2020-2655 JSSE Client Authentication Bypass
      • Practical Dictionary Attack On IPsec IKE
      • CEH: 10 Hacking Tools For Hackers
      • OWASP Announcement
      • Nemesis: A Packet Injection Utility
      • CVE-2020-2655 JSSE Client Authentication Bypass
      • Spykey - FUD Win32 Keylogger And Reverse Shell
      • Router-Exploit-Shovel: An Automated Application Ge...
      • JoomlaScan - Tool To Find The Components Installed...
      • Top 10 Best Google Gravity Tricks 2018
      • The OWASP Foundation Has Selected The Technical Wr...
      • Secret Hack Codes For Android Mobile Phones
      • Remot3d - An Easy Way To Exploiting
      • CORS Misconfigurations On A Large Scale
      • How To Repair A Crashed SD Card And Protect Your Data
      • What Is Brave Browser And How Does It Compares To ...
      • 12 Ways To Hack Facebook Account Passwords And Its...
      • Remot3d - An Easy Way To Exploiting
      • Lockdoor-Framework: A PenTesting Framework With Cy...
      • EasySploit: A Metasploit Automation Bash Scripts T...
      • Blockchain Exploitation Labs - Part 1 Smart Contra...
      • Hash Identifier - The Hash Identify Tool
      • CEH Practical: Information-Gathering Methodology
      • Hacktronian: All In One Hacking Tools Installer Fo...
      • Snmpcheck
      • BurpSuite Introduction & Installation
      • Blockchain Exploitation Labs - Part 1 Smart Contra...
      • Download: 'Coronavirus Cyber Security For Manageme...
      • Rootkit Umbreon / Umreon - X86, ARM Samples
      • BurpSuite Introduction & Installation
      • Download: 'Coronavirus Cyber Security For Manageme...
      • ISPY: Exploiting EternalBlue And BlueKeep Vulnerab...
      • S2 Dynamic Tracer And Decompiler For Gdb
      • Ethical Hackers Platform: How To Install A bWAPP I...
      • Entropy: Netwave And GoAhead IP Webcams Exploiting...
      • HOW TO ROOT A SERVER? – SERVER ROOTING
      • Bypass Hardware Firewalls
      • OVER $60 MILLION WORTH OF BITCOINS HACKED FROM NIC...
      • Vlang Binary Debugging
      • EGLX, Day 1: Come Find Me This Morning At The Ment...
      • Spyro Reignited Trilogy | Review, Gameplay, News &...
    • ►  April (41)
    • ►  March (15)
    • ►  February (9)
  • ►  2019 (1086)
    • ►  December (20)
    • ►  November (59)
    • ►  September (174)
    • ►  August (271)
    • ►  July (290)
    • ►  June (211)
    • ►  May (46)
    • ►  April (3)
    • ►  March (12)
  • ►  2018 (2)
    • ►  June (2)
  • ►  2016 (1)
    • ►  July (1)
  • ►  2013 (3)
    • ►  February (1)
    • ►  January (2)
  • ►  2012 (3)
    • ►  October (3)
  • ►  2009 (12)
    • ►  November (2)
    • ►  October (1)
    • ►  September (1)
    • ►  August (1)
    • ►  June (1)
    • ►  March (2)
    • ►  January (4)
  • ►  2008 (2)
    • ►  December (2)
 

My Blog List

  • these pants of mine... are always silent.
    Any questions, Jerry?
    2 weeks ago
  • No Way
    Legos in the Afternoon
    11 years ago
  • ...in a whiz
    Tres Leches Lemon Cake
    13 years ago
  • B’s Life in China
    Test
    13 years ago