Battery Backup Conceals a Pentesting Pi

Over the last few years one thing has become abundantly clear: hackers love cramming the Raspberry Pi into stuff. From classic game systems to mirrors, there’s few places that haven’t been invaded by everyone’s favorite Linux SBC. From the inspired to the bizarre, we’ve brought such projects to your attention with minimal editorialization. As we’ve said before: it’s not the job of Hackaday to ask why, we’re here to examine how.

That said, some builds do stand out from the crowd. One such project is the “Pentesting BBU Dropbox” which [b1tbang3r] has recently posted to Hackaday.io. Noticing the battery …read more

Continue reading Battery Backup Conceals a Pentesting Pi

Phishing 2FA Tokens with CredSniper – Tradecraft Security Weekly #25

Organizations are implementing two-factor on more and more web services. The traditional methods for phishing credentials is no longer good enough to gain access to user accounts if 2FA is setup. In this episode Mike Felch (@ustayready) and Beau Bulloc… Continue reading Phishing 2FA Tokens with CredSniper – Tradecraft Security Weekly #25

Evading Network-Based Detection Mechanisms – Tradecraft Security Weekly #24

In this episode of Tradecraft Security Weekly hosts Beau Bullock (@dafthack) and Mike Felch (@ustayready) discuss methods for evading network-based detection mechanisms. Many commercial IDS/IPS devices do a pretty decent job of detecting standard pente… Continue reading Evading Network-Based Detection Mechanisms – Tradecraft Security Weekly #24

On-Demand Webcasts, Net Neutrality, and Pentesting – Paul’s Security Weekly #540

In the news, we talk about pentesting, On-Demand webcasts, net neutrality, Vegemite, and more on this episode of Paul’s Security Weekly! Full Show Notes Subscribe to YouTube Channel
The post On-Demand Webcasts, Net Neutrality, and Pentesting – Pa… Continue reading On-Demand Webcasts, Net Neutrality, and Pentesting – Paul’s Security Weekly #540

Linux Privilege Escalation – Tradecraft Security Weekly #22

After getting a shell on a server you may or may not have root access. To gain privileged access to a Linux system it may take performing more analysis of the system to find escalation issues. In this episode of Tradecraft Security Weekly Beau Bullock … Continue reading Linux Privilege Escalation – Tradecraft Security Weekly #22

Pentest Toolbox Additions 2017

Last year, I wrote a short blog post about tools I had added to my pentesting toolbox. I’ve decided to make this type of article a yearly tradition. In this post, I highlight some of the useful tools I’ve started to use this past year. Doma… Continue reading Pentest Toolbox Additions 2017