Arc of the Hill Country

Advocating and assisting individuals with intellectual and developmental disabilities in their efforts to achieve education, transportation, recreation, employment and residential living goals.

Thursday, June 4, 2020

Bypass Hardware Firewalls

This is just a collection of links about my DEF CON 22 presentation, and the two tools I released:

Slides:
http://www.slideshare.net/bz98/defcon-22-bypass-firewalls-application-white-lists-secure-remote-desktops-in-20-seconds

Tools:
https://github.com/MRGEffitas/Write-into-screen
https://github.com/MRGEffitas/hwfwbypass

Presentation video from Hacktivity:
https://www.youtube.com/watch?v=KPJBckmhtZ8

Technical blog post:
https://blog.mrg-effitas.com/bypass-hardware-firewalls-def-con-22/

Have fun!




More info


  • Is Hacking Illegal
  • Hacking Simulator
  • Hacker Ethic
  • Pentest Documentation
  • Hacking The Art Of Exploitation
  • Pentest Vs Ethical Hacking
  • Hacker Wifi Password
  • Hacking Youtube
  • Pentest Partners
  • Hacker News
  • Pentest Box
  • Rapid7 Pentest
  • Pentest Wifi
  • Hackintosh
  • Pentest App
  • Hacking Images
  • Hacking Ethics
  • Hacking Lab
at 4:30 AM
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest

No comments:

Post a Comment

Newer Post Older Post Home
Subscribe to: Post Comments (Atom)

Check Us Out on Facebook!

  • Arc of the Hill Country Facebook Page
Click here to see photos from our members.
  • The Arc of the Hill Country Website
  • Photo Albums
  • About The Arc of the Hill Country
  • Resources
  • Get Involved
  • Contact Us

Blog Archive

  • ►  2025 (48)
    • ►  June (1)
    • ►  May (2)
    • ►  April (2)
    • ►  March (7)
    • ►  February (6)
    • ►  January (30)
  • ►  2024 (51)
    • ►  December (1)
    • ►  November (2)
    • ►  October (2)
    • ►  August (1)
    • ►  July (1)
    • ►  June (3)
    • ►  May (1)
    • ►  March (1)
    • ►  February (2)
    • ►  January (37)
  • ►  2023 (57)
    • ►  December (2)
    • ►  September (1)
    • ►  August (6)
    • ►  July (3)
    • ►  June (20)
    • ►  May (25)
  • ►  2022 (9)
    • ►  October (1)
    • ►  September (1)
    • ►  August (2)
    • ►  June (1)
    • ►  May (2)
    • ►  March (1)
    • ►  January (1)
  • ►  2021 (20)
    • ►  December (1)
    • ►  November (1)
    • ►  September (1)
    • ►  August (3)
    • ►  July (1)
    • ►  June (1)
    • ►  May (2)
    • ►  April (2)
    • ►  March (3)
    • ►  February (2)
    • ►  January (3)
  • ▼  2020 (398)
    • ►  December (5)
    • ►  November (2)
    • ►  October (4)
    • ►  September (8)
    • ►  August (101)
    • ►  July (102)
    • ▼  June (34)
      • Lucerna (Suiza): Alrededores Del Altstadt
      • Top 15 Free Websites to Learn Hacking this 2018
      • Top 10 Great Gifts For The Hacker In Your Life
      • Ethical Hacking Platform For Penetration Testing |...
      • July 2019 Connector
      • Ufonet - Dos And Ddos Attack Tool | How To Install...
      • Rastrea2R - Collecting & Hunting For IOCs With Gus...
      • JSshell - A JavaScript Reverse Shell For Exploitin...
      • Impost3r - A Linux Password Thief
      • Why Receipt Notifications Increase Security In Signal
      • Tricks To Bypass Device Control Protection Solutions
      • How I Hacked My IP Camera, And Found This Backdoor...
      • How To Download Torrents Files Directly To Your An...
      • Administración Remota De Servidores Desde Android
      • Networking | Switching And Routing | Tutorial 3 | ...
      • HOW TO BOOST UP BROWSING SPEED?
      • HOW TO HACK WHATSAPP ACCOUNT? – WHATSAPP HACK
      • Top Linux Commands Related To Hardware With Descri...
      • DMitry: Deepmagic Information Gathering Tool
      • Learning Web Pentesting With DVWA Part 4: XSS (Cro...
      • Probing For XML Encryption Weaknesses In SAML With...
      • ADVANTAGE OF ETHICAL HACKING
      • Hacking Everything With RF And Software Defined Ra...
      • Ransomware.OSX.KeRanger Samples
      • Save Your Cloud: Gain Root Access To VMs In OpenNe...
      • System Hacking: Password Cracking Techniques And T...
      • Scaling The NetScaler
      • OSIF: An Open Source Facebook Information Gatherin...
      • AutoNSE - Massive NSE (Nmap Scripting Engine) Auto...
      • Bypass Hardware Firewalls
      • How To Hack And Trace Any Mobile Phone With A Free...
      • Top 20 Best Free Hacking Apps For Android |2019|
      • April 2019 Connector
      • PDFex: Major Security Flaws In PDF Encryption
    • ►  May (67)
    • ►  April (51)
    • ►  March (15)
    • ►  February (9)
  • ►  2019 (1063)
    • ►  December (13)
    • ►  November (67)
    • ►  September (173)
    • ►  August (278)
    • ►  July (273)
    • ►  June (181)
    • ►  May (62)
    • ►  April (3)
    • ►  March (12)
    • ►  February (1)
  • ►  2018 (11)
    • ►  December (1)
    • ►  November (3)
    • ►  May (3)
    • ►  April (1)
    • ►  February (2)
    • ►  January (1)
  • ►  2017 (15)
    • ►  September (2)
    • ►  August (2)
    • ►  July (1)
    • ►  June (3)
    • ►  May (1)
    • ►  March (2)
    • ►  February (2)
    • ►  January (2)
  • ►  2016 (35)
    • ►  December (3)
    • ►  November (2)
    • ►  October (3)
    • ►  September (2)
    • ►  August (4)
    • ►  July (3)
    • ►  June (2)
    • ►  May (5)
    • ►  April (3)
    • ►  March (2)
    • ►  February (3)
    • ►  January (3)
  • ►  2015 (47)
    • ►  December (5)
    • ►  November (4)
    • ►  October (3)
    • ►  September (7)
    • ►  August (6)
    • ►  July (3)
    • ►  June (3)
    • ►  May (5)
    • ►  April (5)
    • ►  March (2)
    • ►  February (2)
    • ►  January (2)
  • ►  2014 (25)
    • ►  December (2)
    • ►  November (3)
    • ►  October (5)
    • ►  September (2)
    • ►  August (2)
    • ►  July (1)
    • ►  May (2)
    • ►  April (6)
    • ►  March (1)
    • ►  January (1)
  • ►  2013 (13)
    • ►  December (2)
    • ►  November (3)
    • ►  October (1)
    • ►  August (2)
    • ►  June (3)
    • ►  April (1)
    • ►  January (1)
  • ►  2012 (34)
    • ►  December (2)
    • ►  November (3)
    • ►  October (4)
    • ►  September (4)
    • ►  August (4)
    • ►  July (5)
    • ►  June (2)
    • ►  May (7)
    • ►  April (2)
    • ►  March (1)
Simple theme. Powered by Blogger.