skip to main | skip to sidebar

Srijan Rooftop

About events hosted by Srijan and various adda sessions

Monday, May 11, 2020

Bypass Hardware Firewalls

This is just a collection of links about my DEF CON 22 presentation, and the two tools I released:

Slides:
http://www.slideshare.net/bz98/defcon-22-bypass-firewalls-application-white-lists-secure-remote-desktops-in-20-seconds

Tools:
https://github.com/MRGEffitas/Write-into-screen
https://github.com/MRGEffitas/hwfwbypass

Presentation video from Hacktivity:
https://www.youtube.com/watch?v=KPJBckmhtZ8

Technical blog post:
https://blog.mrg-effitas.com/bypass-hardware-firewalls-def-con-22/

Have fun!




Related links
  • Raspberry Hacking
  • Hacking Xbox One
  • Geekprank Hacking
  • Marketing Growth Hacking
  • Hacking Etico Pdf
  • Hacking With Python
  • Hacking 101
  • Chema Alonso Wikipedia
  • Quiero Ser Hacker
  • Hacking Etico 101 Pdf
  • Wifi Hacking
  • Hacking Time
Posted by Srijan Addas at 3:35 AM

No comments:

Post a Comment

Newer Post Older Post Home
Subscribe to: Post Comments (Atom)

Followers

Blog Archive

  • ►  2025 (57)
    • ►  October (1)
    • ►  August (2)
    • ►  July (2)
    • ►  June (1)
    • ►  May (2)
    • ►  April (2)
    • ►  March (8)
    • ►  February (5)
    • ►  January (34)
  • ►  2024 (58)
    • ►  December (2)
    • ►  October (2)
    • ►  September (1)
    • ►  August (1)
    • ►  July (1)
    • ►  June (1)
    • ►  May (2)
    • ►  April (1)
    • ►  March (2)
    • ►  February (3)
    • ►  January (42)
  • ►  2023 (75)
    • ►  November (2)
    • ►  October (1)
    • ►  August (16)
    • ►  July (5)
    • ►  June (23)
    • ►  May (28)
  • ►  2022 (1)
    • ►  August (1)
  • ►  2021 (3)
    • ►  July (2)
    • ►  June (1)
  • ▼  2020 (349)
    • ►  September (5)
    • ►  August (98)
    • ►  July (102)
    • ►  June (25)
    • ▼  May (46)
      • Voodoo-Kali - Kali Linux Desktop On Windows 10
      • CEH: Gathering Host And Network Information | Scan...
      • Spykey - FUD Win32 Keylogger And Reverse Shell
      • Learn A-Z Kali_Linux Commands For Beginerrs
      • Web-fu - The Ultimate Web Hacking Chrome Extension
      • BASICS OF METASPLOIT – BASIC COMMANDS OF METASPLOIT
      • How Block Chain Technology Can Help Fight Wuhan Co...
      • BEST PASSWORD MANAGERS FOR IOS
      • Chapter 1To 5 HTML
      • OVER $60 MILLION WORTH OF BITCOINS HACKED FROM NIC...
      • Thank You To Volunteers And Board Members That Wor...
      • Cain And Abel
      • Voodoo-Kali - Kali Linux Desktop On Windows 10
      • KillShot: A PenTesting Framework, Information Gath...
      • The OWASP Foundation Has Selected The Technical Wr...
      • How tO Secure Yourself From Evil Twin Attack
      • BurpSuite Introduction & Installation
      • What Is Keylogger? Uses Of Keylogger In Hacking ?
      • Insecurities Of WhatsApp's, Signal's, And Threema'...
      • Collection Of Pcap Files From Malware Analysis
      • Change Passwords Regularly - A Myth And A Lie, Don...
      • iCloudBrutter - AppleID Bruteforce
      • 10 Best Wifi Hacking Android Apps To Hack Others W...
      • NcN 2015 CTF - theAnswer Writeup
      • Part I. Russian APT - APT28 Collection Of Samples...
      • Bypass Hardware Firewalls
      • CEH Practical: Gathering Target Information: Recon...
      • WPSeku V0.4 - Wordpress Security Scanner
      • Masad Clipper And Stealer - Windows Spyware Exfilt...
      • Powerob - An On-The-Fly Powershell Script Obfuscat...
      • PentestBox - Opensource PreConfigured Portable Pen...
      • Takeover - SubDomain TakeOver Vulnerability Scanner
      • How To Protect Your Private Data From Android Apps
      • DigitalOcean Data Leak Incident Exposed Some Of It...
      • Linux Command Line Hackery Series - Part 5
      • Top 20 Best Free Hacking Apps For Android |2019|
      • CEH: 10 Hacking Tools For Hackers
      • CEH Practical: Gathering Target Information: Recon...
      • Collection Of Pcap Files From Malware Analysis
      • Networking | Routing And Switching | Tutorial 2 | ...
      • Secret Hack Codes For Android Mobile Phones
      • Extending Your Ganglia Install With The Remote Cod...
      • How tO Secure Yourself From Evil Twin Attack
      • CLOUDKiLL3R - Bypasses Cloudflare Protection Servi...
      • EA Cricket 2018 Download For Free Full Version
      • Shadow Of The Comet – Miss PICOTT's Dominion
    • ►  April (50)
    • ►  March (15)
    • ►  February (8)
  • ►  2019 (1072)
    • ►  December (16)
    • ►  November (63)
    • ►  September (156)
    • ►  August (291)
    • ►  July (265)
    • ►  June (207)
    • ►  May (59)
    • ►  April (3)
    • ►  March (12)
  • ►  2018 (10)
    • ►  November (4)
    • ►  June (3)
    • ►  April (2)
    • ►  March (1)
  • ►  2016 (69)
    • ►  November (1)
    • ►  September (1)
    • ►  August (2)
    • ►  April (5)
    • ►  March (8)
    • ►  February (9)
    • ►  January (43)
  • ►  2015 (156)
    • ►  December (81)
    • ►  November (2)
    • ►  September (2)
    • ►  August (17)
    • ►  May (1)
    • ►  March (52)
    • ►  February (1)
  • ►  2014 (23)
    • ►  November (1)
    • ►  October (5)
    • ►  August (17)
  • ►  2013 (2)
    • ►  August (1)
    • ►  July (1)
  • ►  2012 (8)
    • ►  September (3)
    • ►  July (1)
    • ►  June (1)
    • ►  May (1)
    • ►  April (1)
    • ►  March (1)
  • ►  2010 (3)
    • ►  January (3)
  • ►  2009 (3)
    • ►  October (3)

About Me

Srijan Addas
View my complete profile