Scripts and Picks
Tuesday, June 20, 2017
A very brief guide to making a challenge lockbox
›
I had a couple requests to document the build process I use for making lockboxes. This year I made new challenge boxes for dcdarknet at defc...
Monday, July 11, 2016
Simple PDF Brute Force Tool using GhostScript 9.09
›
I've had to deal with a lot of PDF's that come in either Secured (cannot copy, cannot print) or Password Protected (requires passwor...
Thursday, December 17, 2015
Z-Con Lock Teardown
›
I got this lock a while ago for two reasons; it's an alarmed padlock, it has a funky key. Since then it's been hanging out in a dis...
Monday, August 17, 2015
Dumping Wireless Passwords from Windows Machines (win7 & win8 tested; win10 not tested) using netsh
›
Here's how to dump all the wifi passwords from a windows machine using builtin tools: Windows 7 - Tested Succesfully Windows 8 - Teste...
Wednesday, March 11, 2015
Windows Event Log Driven Back Doors
›
Well it's about time to get that white hat a little dirty. None of this is original ideas, I've heard of this being done in theory...
Wednesday, July 17, 2013
Masquerading on Palo Alto User-ID Tracking
›
A lot of next gen firewalls have the ability to tag web browsing with a user associated to the computer it came from. I'm going to show ...
Connect to an SSL page through a Socat Proxy
›
So lets say you have a device, at a remote location, that has a SSL web page. You can only access it from the local subnet and you don't...
›
Home
View web version