I am Levi Posts

February 15, 2017 / security

The aim of this article is to showcase a PHP backdoor that is small enough to pass unnoticed while still allowing the execution of complex operations. Maintaining access to a compromised system is one important step during penetration testing. In most cases this is achieved using backdoors. These can either live as standalone pieces of software or as part of legitimate code. And always, no matter how the backdoor is designed, being hard to discover is an important aspect.

Read the PostSmall and Easy to Hide PHP Backdoor with Python Client

January 28, 2017 / howto
January 23, 2017 / security
January 16, 2017 / howto

The Raspberry Pi 3 Model B, compared to older models, comes with a built in WiFi support. However, connecting it to a PEAP-MSCHAP v2 wireless network does not seem to be a straightforward task. While the dhcpdui that ships with Raspbian is able to connect to WPA-PSK networks it is unable to do so for PEAP-MSCHAP v2. This tutorial focuses on configuring your Raspberry Pi in a way that enables PEAP-MSCHAP wireless network connections.

Read the PostConnect Raspberry Pi to PEAP-MSCHAP v2 Wireless Networks

January 13, 2017 / howto
January 10, 2017 / security

If you are reading this tutorial over a wireless connection, or at least you have a wireless network in your house, take a breath and ask yourself, how safe do you feel? Did you use a strong password when you set up your wireless network? Does the password you use…

Read the PostWireless hacking tutorial for the masses, WPA edition

January 10, 2017 / howto

During the IT Camp 2013 “MVC – Common pitfalls and how to resolve them”, Andrei Ignat, the speaker gave us some homework. His question was something like this: “How can you auto-correct misspelled actions inside the controller and redirect the user to the right action”. For example if the user…

Read the PostASP.NET MVC 4 – Auto-correcting unknown actions