Scripts and Picks

Tuesday, June 20, 2017

A very brief guide to making a challenge lockbox

›
I had a couple requests to document the build process I use for making lockboxes. This year I made new challenge boxes for dcdarknet at defc...
Monday, July 11, 2016

Simple PDF Brute Force Tool using GhostScript 9.09

›
I've had to deal with a lot of PDF's that come in either Secured (cannot copy, cannot print) or Password Protected (requires passwor...
Thursday, December 17, 2015

Z-Con Lock Teardown

›
I got this lock a while ago for two reasons; it's an alarmed padlock, it has a funky key. Since then it's been hanging out in a dis...
Monday, August 17, 2015

Dumping Wireless Passwords from Windows Machines (win7 & win8 tested; win10 not tested) using netsh

›
Here's how to dump all the wifi passwords from a windows machine using builtin tools: Windows 7 - Tested Succesfully Windows 8 - Teste...
Wednesday, March 11, 2015

Windows Event Log Driven Back Doors

›
Well it's about time to get that white hat a little dirty. None of this is original ideas, I've heard of this being done in theory...
Wednesday, July 17, 2013

Masquerading on Palo Alto User-ID Tracking

›
A lot of next gen firewalls have the ability to tag web browsing with a user associated to the computer it came from. I'm going to show ...

Connect to an SSL page through a Socat Proxy

›
So lets say you have a device, at a remote location, that has a SSL web page. You can only access it from the local subnet and you don't...
›
Home
View web version
Powered by Blogger.