I am Levi Posts

May 18, 2017 / security

Stealing Windows credentials is the ultimate goal of every penetration tester. Being able to leak them outside the local network just aggravates the problem. There are many ways one can achieve this, some requiring complex attacks or user interaction. There is however an old and undocumented Windows feature that transforms the business of stealing Windows credentials a walk in the park. Let me introduce Windows Explorer Shell Command Files.

May 14, 2017 / howto

Xamarin Forms is versatile enough on its own. Combine it with Reactive UI and you get the most elegant and modular apps on any mobile or desktop platform. I started writing Android apps using Xamarin Forms a couple of months ago and fell in love with it immediately. Also, by…

May 9, 2017 / howto

If you wanted to build your own Android app to connect to a Python service, over Bluetooth, to control a Raspberry Pi, you just found the resources to do so. I know there are plenty of apps that control a Raspberry Pi. Most of them connect over SSH and some of them using Bluetooth. However, finding a tutorial that teaches you how to build your own is harder. You can probably do some research like I did and write an app but I haven’t managed to get the whole information in the same place.

February 15, 2017 / security

The aim of this article is to showcase a PHP backdoor that is small enough to pass unnoticed while still allowing the execution of complex operations. Maintaining access to a compromised system is one important step during penetration testing. In most cases this is achieved using backdoors. These can either live as standalone pieces of software or as part of legitimate code. And always, no matter how the backdoor is designed, being hard to discover is an important aspect.

January 28, 2017 / howto
January 23, 2017 / security
January 16, 2017 / howto

The Raspberry Pi 3 Model B, compared to older models, comes with a built in WiFi support. However, connecting it to a PEAP-MSCHAP v2 wireless network does not seem to be a straightforward task. While the dhcpdui that ships with Raspbian is able to connect to WPA-PSK networks it is unable to do so for PEAP-MSCHAP v2. This tutorial focuses on configuring your Raspberry Pi in a way that enables PEAP-MSCHAP wireless network connections.

January 13, 2017 / howto
January 10, 2017 / security

If you are reading this tutorial over a wireless connection, or at least you have a wireless network in your house, take a breath and ask yourself, how safe do you feel? Did you use a strong password when you set up your wireless network? Does the password you use…

January 10, 2017 / howto

During the IT Camp 2013 “MVC – Common pitfalls and how to resolve them”, Andrei Ignat, the speaker gave us some homework. His question was something like this: “How can you auto-correct misspelled actions inside the controller and redirect the user to the right action”. For example if the user…