skip to main | skip to sidebar

Mike Rutkoski

Monday, June 8, 2020

Bypass Hardware Firewalls

This is just a collection of links about my DEF CON 22 presentation, and the two tools I released:

Slides:
http://www.slideshare.net/bz98/defcon-22-bypass-firewalls-application-white-lists-secure-remote-desktops-in-20-seconds

Tools:
https://github.com/MRGEffitas/Write-into-screen
https://github.com/MRGEffitas/hwfwbypass

Presentation video from Hacktivity:
https://www.youtube.com/watch?v=KPJBckmhtZ8

Technical blog post:
https://blog.mrg-effitas.com/bypass-hardware-firewalls-def-con-22/

Have fun!




Continue reading


  • Pentest Wifi
  • Pentest App
  • Hacking Books
  • Pentest Distro
  • Hacking Site
  • Hacker Computer
  • Pentesting And Ethical Hacking
  • Pentest Environment
  • Hacker Kevin Mitnick
  • Pentest Stages
  • Pentest Hardware
  • Pentest Windows
  • Pentest Environment
  • Hacking Device
  • Hacking For Dummies
  • How To Pentest A Website With Kali
  • Hacking Resources
Posted by Mike Rutkoski at 10:56 AM

No comments:

Post a Comment

Newer Post Older Post Home
Subscribe to: Post Comments (Atom)

Followers

Blog Archive

  • ►  2025 (53)
    • ►  July (2)
    • ►  June (1)
    • ►  May (5)
    • ►  April (2)
    • ►  March (6)
    • ►  February (5)
    • ►  January (32)
  • ►  2024 (61)
    • ►  December (1)
    • ►  November (1)
    • ►  September (1)
    • ►  August (3)
    • ►  July (1)
    • ►  June (3)
    • ►  May (1)
    • ►  March (3)
    • ►  February (5)
    • ►  January (42)
  • ►  2023 (71)
    • ►  December (1)
    • ►  November (1)
    • ►  October (1)
    • ►  September (2)
    • ►  August (9)
    • ►  July (4)
    • ►  June (23)
    • ►  May (30)
  • ►  2022 (1)
    • ►  August (1)
  • ▼  2020 (366)
    • ►  September (5)
    • ►  August (98)
    • ►  July (102)
    • ▼  June (26)
      • ¿Qué Le Vas A Regalar A Tu Papá?
      • Top 18 Websites to Learn How to Hack Like a Pro 2018
      • DOWNLOAD SENTRY MBA V1.4.1 – AUTOMATED ACCOUNT CRA...
      • Any Indian DigiLocker Account Could've Been Access...
      • Spykey - FUD Win32 Keylogger And Reverse Shell
      • PKCE: What Can(Not) Be Protected
      • How To Make A Simple And Powerful Keylogger Using ...
      • Bypass Hardware Firewalls
      • New USBCulprit Espionage Tool Steals Data From Air...
      • Top 10 Great Gifts For The Hacker In Your Life
      • OWASP ZAP RELEASES V2.8.0 WITH THE HEADS UP DISPLAY
      • 15 Hidden Android Features You Should Know
      • GitMonitor - A Github Scanning System To Look For ...
      • DOWNLOAD SENTRY MBA V1.4.1 – AUTOMATED ACCOUNT CRA...
      • Masad Clipper And Stealer - Windows Spyware Exfilt...
      • Novell Zenworks MDM: Mobile Device Management For ...
      • Diggy - Extract Enpoints From APK Files
      • TYPES OF HACKER
      • WHAT IS ETHICAL HACKING
      • Router-Exploit-Shovel: An Automated Application Ge...
      • WWE Libera Contenido Gratuito En Su Plataforma Net...
      • Printer Security
      • Swann Song - DVR Insecurity
      • RainbowCrack
      • Arris Cable Modem Backdoor - I'm A Technician, Tru...
      • Pointers Part 1: The Basics
    • ►  May (68)
    • ►  April (43)
    • ►  March (15)
    • ►  February (9)
  • ►  2019 (1144)
    • ►  December (15)
    • ►  November (69)
    • ►  September (170)
    • ►  August (305)
    • ►  July (291)
    • ►  June (219)
    • ►  May (61)
    • ►  April (2)
    • ►  March (12)
  • ►  2018 (2)
    • ►  June (2)
  • ►  2015 (2)
    • ►  February (2)
  • ►  2014 (5)
    • ►  December (3)
    • ►  November (1)
    • ►  January (1)
  • ►  2013 (6)
    • ►  December (2)
    • ►  October (3)
    • ►  September (1)
  • ►  2012 (6)
    • ►  September (1)
    • ►  June (1)
    • ►  March (4)
  • ►  2011 (5)
    • ►  November (1)
    • ►  October (1)
    • ►  September (1)
    • ►  August (1)
    • ►  May (1)
  • ►  2010 (2)
    • ►  June (2)
  • ►  2008 (1)
    • ►  November (1)

About Me

Mike Rutkoski
View my complete profile