Phwning the boardroom: hacking an Android conference phone
At Context we’re always on the lookout for interesting devices to play with. Sat in a meeting room one day, we noticed that the menus on the conference phone, aRead More →
At Context we’re always on the lookout for interesting devices to play with. Sat in a meeting room one day, we noticed that the menus on the conference phone, aRead More →
A web application vulnerable to Python code injection allows you to send Python code though the application to the Python interpreter on the target server. If you can execute python,Read More →
Sometimes, during security audits, we may encounter a situation where everything is being managed correctly. In other words security patches, policies, network segmentation, antivirus, and user awareness, to name just aRead More →
The manufacturer USBKill.com has commercialized USB Kill 2.0, a USB dongle that is able to fry any computer through the USB ports. The Hong Kong-based technology manufacturer USBKill.com has createdRead More →
Short Bytes: Password cracking is an integral part of digital forensics and pentesting. Keeping that in mind, we have prepared a list of the top 10 best password cracking toolsRead More →
How I Hacked Facebook, and Found Someone’s Backdoor Script(English Version) Foreword As a pentester, I love server-side vulnerabilities more than client-side ones. Why? Because it’s way much cooler to takeRead More →
During a recent penetration test, I was performing some packet captures and noticed some unencrypted Microsoft SQL Server (MSSQL) traffic. The syntax was unmistakable. At first I thought this might beRead More →
Matt Graeber showed the method on performing WMI attacks and its effects, but he didn’t talk much about the details. Therefore, this paper mainly details about using powershell to implementRead More →
Social engineering with very obvious assets blinds you to techno-toolkit. MILDLY NSFW A Chinese hardware hacker has hidden a penetration-testing toolkit into her high-heeled shoes. The Wi-Fi-popping platforms were forged inRead More →