Stealing Windows credentials is the ultimate goal of every penetration tester. Being able to leak them outside the local network just aggravates the problem. There are many ways one can achieve this, some requiring complex attacks or user interaction. There is however an old and undocumented Windows feature that transforms the business of stealing Windows credentials a walk in the park. Let me introduce Windows Explorer Shell Command Files.
I am Levi Posts
Xamarin Forms is versatile enough on its own. Combine it with Reactive UI and you get the most elegant and modular apps on any mobile or desktop platform. I started writing Android apps using Xamarin Forms a couple of months ago and fell in love with it immediately. Also, by…
If you wanted to build your own Android app to connect to a Python service, over Bluetooth, to control a Raspberry Pi, you just found the resources to do so. I know there are plenty of apps that control a Raspberry Pi. Most of them connect over SSH and some of them using Bluetooth. However, finding a tutorial that teaches you how to build your own is harder. You can probably do some research like I did and write an app but I haven’t managed to get the whole information in the same place.
The aim of this article is to showcase a PHP backdoor that is small enough to pass unnoticed while still allowing the execution of complex operations. Maintaining access to a compromised system is one important step during penetration testing. In most cases this is achieved using backdoors. These can either live as standalone pieces of software or as part of legitimate code. And always, no matter how the backdoor is designed, being hard to discover is an important aspect.
The Raspberry Pi can be a cheap, low power, always on seedbox. Compared to more pricey alternatives, like a NAS with torrenting support, the Pi plays the seedbox job pretty well.
Hidden SSID wireless networks, a security myth that makes you feel safer. Too bad it is just something that provides no extra security at all. My aim is to show you how easy it is to discover the SSID of an access point even if it is hidden.
The Raspberry Pi 3 Model B, compared to older models, comes with a built in WiFi support. However, connecting it to a PEAP-MSCHAP v2 wireless network does not seem to be a straightforward task. While the dhcpdui that ships with Raspbian is able to connect to WPA-PSK networks it is unable to do so for PEAP-MSCHAP v2. This tutorial focuses on configuring your Raspberry Pi in a way that enables PEAP-MSCHAP wireless network connections.
Step by step guide on how to send the IP address of your Raspberry Pi to your Gmail account when the board starts. This way it is easier to find and access over a local area network from other devices.
If you are reading this tutorial over a wireless connection, or at least you have a wireless network in your house, take a breath and ask yourself, how safe do you feel? Did you use a strong password when you set up your wireless network? Does the password you use…
During the IT Camp 2013 “MVC – Common pitfalls and how to resolve them”, Andrei Ignat, the speaker gave us some homework. His question was something like this: “How can you auto-correct misspelled actions inside the controller and redirect the user to the right action”. For example if the user…