Tag Archives | defcon

Unicorn – PowerShell Downgrade Attack

Magic Unicorn is a simple tool for using a PowerShell downgrade attack to inject shellcode straight into memory. Based on Matthew Graeber’s PowerShell attacks and the PowerShell bypass technique presented by David Kennedy (TrustedSec) and Josh Kelly at Defcon 18. Usage is simple, just run Magic Unicorn (ensure Metasploit is installed and in the right […]

Topic: Hacking Tools, Windows Hacking

Android Phones (Possibly) Hacked At Defcon On CDMA & 4G (HSPA)

It seems like some major ownage was layed down at Defcon, I was very interested by the thread coderman posted in Full Disclosure earlier: DEF CON 19 – hackers get hacked! Especially when some people did chime in with supporting opinions and agreeing that it does seem like they got hacked. Basically someone setup some […]

Topic: Exploits/Vulnerabilities, Privacy

iKAT – Interactive Kiosk Attack Tool v3

iKAT was designed to aid security consultants with the task of auditing the security of a Windows based internet Kiosk terminal. iKAT is designed to provide access to the underlying operating system of a Kiosk terminal by invoking native OS functionality. This tool should be (and is) used by Kiosk vendors/developers/suppliers to test the security […]

Topic: Hacking Tools, Hardware Hacking

AV Firms Split Over Defcon Contest

Now this is a pretty interesting contest from the guys at Defcon, antivirus evasion! It’s a question that gets asked a LOT…how do I avoid AV? There are various ways to do it and I’ll be interested to see which are used in the contest, the most elegant solutions of course get better prizes. Security […]

Topic: Countermeasures, Events/Cons, Malware

Security Events Around the World

Following Darknet post regarding SyScan’06, I decided to make a little resume of the most important security events all around the world. Unfortunately we won’t be able to go, so all the pictures are welcome. (-: If there’s any missing do let us know. Recon 2006 – WWW – 16 June to 18 June 2006 […]

Topic: Events/Cons

Popular Tags

computer-security · darknet · ddos · dos · exploits · fuzzing · google · hacking-networks · hacking-websites · hacking-windows · hacking tool · information gathering · malware · microsoft · network-security · Network Hacking · Password Cracking · pen-testing · penetration-testing · Phishing · Privacy · Python · scammers · Security · Security Software · spam · spammers · sql-injection · trojan · trojans · virus · viruses · vulnerabilities · web-application-security · web-security · windows · windows-security · Windows Hacking · worms · XSS ·