HACKING INETNO DG201A
I have ran my VDSL2 box happily in bridge mode and thinking that there is not that much of risk because the box should be just forwarding the packets to my firewall. After doing some changes to my VDSL -box I realized that for some strange reason it will take IP from the Internet even when it should be in bridged mode.
http://www.happyhacking.org/HappyHacking/hacking/2013/11/07/Hacking-Inetno-DG201A.html
I have ran my VDSL2 box happily in bridge mode and thinking that there is not that much of risk because the box should be just forwarding the packets to my firewall. After doing some changes to my VDSL -box I realized that for some strange reason it will take IP from the Internet even when it should be in bridged mode.
http://www.happyhacking.org/HappyHacking/hacking/2013/11/07/Hacking-Inetno-DG201A.html
www.happyhacking.org
Happy Hacking | Hacking Inetno DG201A
I love to hack and sometimes while hacking my devices I find all kinds of tricks and information which can’t be found with google. So my main reason for this page is to share information. I do all my hacks on my free time so there will be quiet times also.
WeMo Hacking
I've spent some time reverse engineering my WeMo switch. It's pretty cool and I figured out how to get it to do what I wanted. It's based on UPnP, which I found the miranda tool to be the best (closest to working with WeMo, and easiest to read)
I had to make some modifications to the miranda package to get it working, and to get it properly reporting the details of the device.
https://github.com/issackelly/wemo
I've spent some time reverse engineering my WeMo switch. It's pretty cool and I figured out how to get it to do what I wanted. It's based on UPnP, which I found the miranda tool to be the best (closest to working with WeMo, and easiest to read)
I had to make some modifications to the miranda package to get it working, and to get it properly reporting the details of the device.
https://github.com/issackelly/wemo
GitHub
GitHub - issackelly/wemo: wemo Proof of Concept. Should be used as a starting point for your own UPnP WeMo hacking
wemo Proof of Concept. Should be used as a starting point for your own UPnP WeMo hacking - issackelly/wemo
Forwarded from Cyber Threat Intelligence
BleepingComputer
FBI arrests man for plan to kill “70% of Internet” in AWS bomb attack
The FBI arrested a Texas man on Thursday for allegedly planning to "kill of about 70% of the internet" in a bomb attack targeting an Amazon Web Services (AWS) data center on Smith Switch Road in Ashburn, Virginia.
Rootkits Everywhere Com Forbidden
No tema de hoje falaremos sobre Rootkits, e o nosso convidado é Ighor "Forbidden" Augusto.
https://youtu.be/1w8QIGB26rA
No tema de hoje falaremos sobre Rootkits, e o nosso convidado é Ighor "Forbidden" Augusto.
https://youtu.be/1w8QIGB26rA
YouTube
Rootkits Everywhere Com Forbidden
Senhoras e Senhores, sejam bem vindos para mais um hangout do canal, e no tema de hoje falaremos sobre Rootkits, e o nosso convidado é Ighor "Forbidden" Augu...
Android reversing #1: APK, Smali and ADB
Android reverse-engineering part 1: The APK format, an introduction to Smali and using ADB
https://youtu.be/uc7eZGE07ps
Android reverse-engineering part 1: The APK format, an introduction to Smali and using ADB
https://youtu.be/uc7eZGE07ps
YouTube
Android reversing #1: APK, Smali and ADB
Android reverse-engineering part 1: The APK format, an introduction to Smali and using ADB
Demystifying Modern Windows Rootkits
This talk will demystify the process of writing a rootkit, moving past theory and instead walking the audience through the process of going from a driver that says "Hello World" to a driver that abuses never-before-seen hooking methods to control the user-mode network stack. Analysis includes common patterns seen in malware and the drawbacks that come with malware in kernel-mode rather than user-mode.
https://youtu.be/ZASsIpdumcY
This talk will demystify the process of writing a rootkit, moving past theory and instead walking the audience through the process of going from a driver that says "Hello World" to a driver that abuses never-before-seen hooking methods to control the user-mode network stack. Analysis includes common patterns seen in malware and the drawbacks that come with malware in kernel-mode rather than user-mode.
https://youtu.be/ZASsIpdumcY
YouTube
Demystifying Modern Windows Rootkits
This talk will demystify the process of writing a rootkit, moving past theory and instead walking the audience through the process of going from a driver that says "Hello World" to a driver that abuses never-before-seen hooking methods to control the user…
ATT&CK® Deep Dive: How to Detect Rootkits
Immerse yourself in the world of rootkits—a potent and obscure variety of malware that’s as attractive to adversaries as it is elusive to defenders.
Get the rootkit definition, explore different types of rootkits, and see how they manifest on Linux, Windows, and macOS
Learn how to detect rootkits and identify activities for threat hunts and alert investigations
Get insights into how you can use the ATT&CK framework to shore up your vulnerabilities
Address your visibility requirements so you can configure preventative and detection controls
Rootkits exist at the lowest levels of an operating system, offering adversaries stealthy, persistent, and comprehensive control over an infected machine. Since this kind of malicious software often resides beneath the application layer of the operating system in a highly privileged piece of software called the kernel, it can be difficult to observe, let alone detect.
https://youtu.be/Kmq9TFXdkg4
Immerse yourself in the world of rootkits—a potent and obscure variety of malware that’s as attractive to adversaries as it is elusive to defenders.
Get the rootkit definition, explore different types of rootkits, and see how they manifest on Linux, Windows, and macOS
Learn how to detect rootkits and identify activities for threat hunts and alert investigations
Get insights into how you can use the ATT&CK framework to shore up your vulnerabilities
Address your visibility requirements so you can configure preventative and detection controls
Rootkits exist at the lowest levels of an operating system, offering adversaries stealthy, persistent, and comprehensive control over an infected machine. Since this kind of malicious software often resides beneath the application layer of the operating system in a highly privileged piece of software called the kernel, it can be difficult to observe, let alone detect.
https://youtu.be/Kmq9TFXdkg4
YouTube
ATT&CK® Deep Dive: How to Detect Rootkits
Immerse yourself in the world of rootkits—a potent and obscure variety of malware that’s as attractive to adversaries as it is elusive to defenders.
Get the rootkit definition, explore different types of rootkits, and see how they manifest on Linux, Windows…
Get the rootkit definition, explore different types of rootkits, and see how they manifest on Linux, Windows…
Hacking Digital Outdoor on Hong Kong - Red Team Physical Attack
Hackeando Outdoor Digital em Hong Kong - Red Team Attack Fisico.
https://youtu.be/-giVfEF1RD0
Hackeando Outdoor Digital em Hong Kong - Red Team Attack Fisico.
https://youtu.be/-giVfEF1RD0
Forwarded from SHELL SHOCK
Udemy
Python para no matemáticos: De 0 hasta reconocimiento facial