bsodtutorials.wordpress.com
Other Pages | Machines Can Think
https://bsodtutorials.wordpress.com/otherpages
Windows Internals, Theorectical Computer Science, Mathematics and Philosophy. There are many good websites and blogs which are related to Reverse Engineering, BSOD Debugging and Mathematics. This page has been created to house all the websites which teach the aforementioned topics to the best of my knowledge. If you would like for your website to be added to the list, then please post a request in the comments section. Adam Pooley Web Developer. BSOD Kernel Dump Analysis. Jared is a Global Moderator at S...
michaelhendrickx.com
internet |
https://michaelhendrickx.com/category/internet
Internet – Makl Ndrix. May contain traces of nuts. Install Burp CA certificate on Android Emulator. July 3, 2014 – 10:23 am. Some people ask me how they can “hijack” HTTPS API calls from an Android app. One of the best ways is to use PortSwiggers free Burp Suite. And hijack all traffic between your app and the server. One of the problems is, how do you add burp’s CA certificate to your android (emulator)? Burp’s help page. Phone numbers as default eLife WiFi keys. February 13, 2013 – 2:53 pm. This mobile...
vsftpd.devnet.ru
Extended vsFTPd builds
http://vsftpd.devnet.ru/eng
Probably the most secure and fastest FTP server for UNIX-like systems. VsFTPd home at https:/ security.appspot.com/vsftpd.html. Original source of vsFTPd by Chris Evans. VsFTPd.devnet.ru is NOT an official site! SVN repository for project at http:/ vsftpd.devnet.ru/vsftpd/. VsFTPd 2.2.2. Last build ext.9 at http:/ vsftpd.devnet.ru/files/2.2.2/ext.9/. On SVN: svn co http:/ vsftpd.devnet.ru/vsftpd/tags/vsFTPd-2.2.2-ext.9/. Dev on SVN: svn co http:/ vsftpd.devnet.ru/vsftpd/branches/2.2.2-ext/. 17062012 - St...
michaelhendrickx.com
Tools |
https://michaelhendrickx.com/tools
Tools – Makl Ndrix. May contain traces of nuts. In a previous life, I created some tools:. Update: also check my github page. A tool to watch remote IIS directory settings. Written in Perl. (September 2003):. Shellcode that generates a asp.cmd file, and puts it in c: inetpub wwwroot shell.asp (August 2003). ARP request interceptor [ README. Finds x86 opcodes in a process’ memory space, to ease finding return addresses for creating opcodes. (September 2003). OWA 2010 brute force script. [ README.
michaelhendrickx.com
Lilith |
https://michaelhendrickx.com/lilith
Lilith – Makl Ndrix. May contain traces of nuts. LiLith is a tool written in Perl to audit web applications. This tool analyses webpages and looks for html form tags , which often refer to dynamic pages that might be subject to SQL injection or other flaws. It works as an ordinary spider and analyses pages, following hyperlinks, injecting special characters that have a special meaning to any underlying platform. Got rid of many many false positives (that’s good). Improved (i hope) scanning engine. Pingba...
michaelhendrickx.com
burp-suite |
https://michaelhendrickx.com/tag/burp-suite
Burp-suite – Makl Ndrix. May contain traces of nuts. Install Burp CA certificate on Android Emulator. July 3, 2014 – 10:23 am. Some people ask me how they can “hijack” HTTPS API calls from an Android app. One of the best ways is to use PortSwiggers free Burp Suite. And hijack all traffic between your app and the server. One of the problems is, how do you add burp’s CA certificate to your android (emulator)? Burp’s help page. Proudly powered by WordPress.
michaelhendrickx.com
burp |
https://michaelhendrickx.com/tag/burp
Burp – Makl Ndrix. May contain traces of nuts. Install Burp CA certificate on Android Emulator. July 3, 2014 – 10:23 am. Some people ask me how they can “hijack” HTTPS API calls from an Android app. One of the best ways is to use PortSwiggers free Burp Suite. And hijack all traffic between your app and the server. One of the problems is, how do you add burp’s CA certificate to your android (emulator)? Burp’s help page. Proudly powered by WordPress.
michaelhendrickx.com
security |
https://michaelhendrickx.com/category/security
Security – Makl Ndrix. May contain traces of nuts. Post exploitation tools: Lazagne. June 9, 2016 – 9:16 am. Often, after a compromise of a machine, red teams / adversaries search for certificates or credentials to hop to other machines, often referred to as “lateral movement”. When doing so, many use Mimikatz. A tool that extracts credentials, PIN codes and kerberos tickets from memory. There are countless blog articles about how to detect it, and hide it from AV, etc. Quick SSH security tips. This, and...
SOCIAL ENGAGEMENT