Magic Unicorn is a simple tool for using a PowerShell downgrade attack to inject shellcode straight into memory. Based on Matthew Graeber’s PowerShell attacks and the PowerShell bypass technique presented by David Kennedy (TrustedSec) and Josh Kelly at Defcon 18. Usage is simple, just run Magic Unicorn (ensure Metasploit is installed and in the right […]
defcon
Android Phones (Possibly) Hacked At Defcon On CDMA & 4G (HSPA)
It seems like some major ownage was layed down at Defcon, I was very interested by the thread coderman posted in Full Disclosure earlier: DEF CON 19 – hackers get hacked! Especially when some people did chime in with supporting opinions and agreeing that it does seem like they got hacked. Basically someone setup some […]
iKAT – Interactive Kiosk Attack Tool v3
iKAT was designed to aid security consultants with the task of auditing the security of a Windows based internet Kiosk terminal. iKAT is designed to provide access to the underlying operating system of a Kiosk terminal by invoking native OS functionality. This tool should be (and is) used by Kiosk vendors/developers/suppliers to test the security […]
Security Events Around the World
[ad] Following Darknet post regarding SyScan’06, I decided to make a little resume of the most important security events all around the world. Unfortunately we won’t be able to go, so all the pictures are welcome. (-: If there’s any missing do let us know. Recon 2006 – WWW – 16 June to 18 June […]