All Stories

Laptops aren’t firewalls

As if you needed another reason to visit Blackhat this summer, two researchers just found a way to hack into wireless cards remotely and take over laptops. David Maynor and Jon Ellch ...

In Mar 02, 2015

Does Surfing Without JavaScript Make You Secure

Welllll, as it turns out, we actually can still do significant recon without the use of JavaScript or Java or Flash. I think Jeremiah is going to wait until Blackhat Japan, so I’m not...

In Jan 09, 2015

How To Access Blocked Websites

I happened upon an article last night talking about how to access blocked websites. First of all, this is sorta missing a major component that most people are actually concerned with,...

In Jan 01, 2015

Creating AutoIt Bots for Online Games

I created this post because I want to suck up space and waste peoples time who read it, if you don’t like what I have to say, just move on and ignore me hence-fourth, thank you.

In Feb 02, 2014

SSL Can Hurt Security

SSL can actually harm web application security auditing and intrusion detection. In fact, SSL can actually make it next to impossible for you to do forensics in the aftermath of a suc...

In Mar 12, 2013

Using Sockcap To Get Around Realm Down in Diablo 2

I got tired of everyone always asking how to get around a IP ban in Diablo II…. So I decided to write this tutorial.

In Jan 01, 2013

Big List of Network Security Tools for Linux & Win32

Manually Compiled. This list is for information and educational purposes only. I will not hold responsibility for any abuse of these tools. Some of these tools are Linux-only. I will ...

In Jan 01, 2013

Accessing Trillian Pro Remotely and Through an Encrypted Tunnel

I am writing this because I constantly run into situations where people want to do things like browse the web, or talk over the net but they don’t want their office to see what they a...

In Dec 12, 2012

Email Obfuscation and Spam Robots

I’ve long been interested in spam and robots that scrape for email addresses. I’ve done tons of work in the space, although I’ve never published any of it. Call it more of a side hobb...

In May 03, 2012

Detecting some forms of MITM attacks

There are quite a few different methods of performing MITM attacks, but one in particular kinda struck my fancy early on when I was thinking about airpwn. In the case of airpwn and si...

In Apr 02, 2012

Ads

Bypass Geo-Blocking With PureVPN. Best VPN