6c2e6e2eGetting root password from firmware image ( TP-Link WR740n example)Today I will teach you how to obtain the root password from a WiFi router firmware image.Mar 7, 20183Mar 7, 20183
6c2e6e2eNetgear ProSafe FVS318N — Path Traversal to /etc/shadowA few years ago this was one of my first exploit that I have written myself. Without wasting much of your time let’s jump in!Mar 7, 2018Mar 7, 2018
6c2e6e2eNetwork pivoting like a pro!Often during penetration tests or security assessments you start from the external network and you try to get to the internal network and…Mar 2, 2018Mar 2, 2018
6c2e6e2eWhat are the security implications of my credit card number being known by someone else?About one year ago someone on the Security Stack Exchanged asked this question…Mar 1, 2018Mar 1, 2018
6c2e6e2eSpawning interactive reverse shells with TTYEarly user terminals connected to computers were electromechanical teleprinters or teletypewriters (TeleTYpewriter, TTY), and since then…Feb 28, 20181Feb 28, 20181
6c2e6e2eHoneypots with Modern Honey Network (MHN)Hi to every one, today I am going to teach both how you can host your own honeypot network and what to do with the collected data.Feb 27, 20181Feb 27, 20181