• Hackers w/ Handhelds V 1.0

    Hackers w/ Handhelds V 1.0

    No doubt we have been goofing around with Hak5’s latest hardware, the Wi-Fi Pineapple pager. We set up a separate, isolated Wi-Fi network lab/playground and let this bad boy go to town. Now that we’ve spent some time getting our theme set, and Null-Buddy released, we’re set to start doing some serious commitments to our…

  • Living Off The Land: Sliver C2-sharpsh edition

    Living Off The Land: Sliver C2-sharpsh edition

    After just wrapping up on recent adventures of PEN-300, one thing is clear: most lab environments waste no time spilling their secrets once you use tools like SharpHound, PowerView and maybe even ADPeas! But what about those situations where such tools get caught? Or you are sitting in an air-gapped environment with zero internet access…

  • Out Of Office – BSides Buffalo

    Out Of Office – BSides Buffalo

    This month we’re pushing out June’s blog slightly early, as we are currently heading to Buffalo New York for BSides. We are thrilled to have been accepted to share our talk: “A New Host Touches the Beacon” once again. We’ve updated the slides and cannot wait to show off our newest version of this incredibly…

  • Available Quickhack: GonkWare

    Available Quickhack: GonkWare

    “In Night City, you’re either a gonk or a ghost in the system. Which one are you?” – Hexxed BitHeadz Jack In Welcome to this month’s blog, chooms! Whether you’re a Nomad prowling the city outskirts, a Streetkid hustling the alleys of Heywood, or a Corpo with chrome running through your veins climbing the corporate…

  • Wake Up, Arty: The PHY is Calling

    Wake Up, Arty: The PHY is Calling

    Previously on “Challenge Accepted: FPGA Ethernet Filters” I started this ambitious (to say the least 😆) journey, of building an FPGA-based network filter. I spent time understanding, debugging and wrapping my head around the whole setup and implementation, without realizing one simple and painful fact: the Ethernet physical connection was not working. My goal was…

  • Re-Vita-Lized

    Re-Vita-Lized

    I don’t know who the hell started this “themed GIFs” thing in our blogs, but I’m pretty sure it was Izzny.  If it was indeed me, I’m still pointing at Izzny.  I didn’t have a great GIF theme idea for this one right away, but I also didn’t want to be the one to ruin…

  • Challenge Accepted: FPGA Ethernet Filters

    Challenge Accepted: FPGA Ethernet Filters

    You see, kids, building an FPGA-based network filter isn’t just about blocking packets; it’s all about the design. In this blog, I’ll take you through how I created, tested, and re-tested the implementation of an Ethernet filtering system—laying the first stone of something LEGENDARY. Never seen How I Met Your Mother? Doesn’t matter. If you…

  • Notepad(p)esky(p)lugins

    Notepad(p)esky(p)lugins

    It was only months ago we got to go do our very first cyber related talk at BSides Las Vegas, which involved demoing how a malicious DLL mod for Skyrim could look like.  At the end, during Q&A, someone asked a question along the lines of “How many corporate computers do think have Skyrim installed?”…

  • The One Where FPGA Says Hello and Lights Up

    The One Where FPGA Says Hello and Lights Up

    Have you ever had that feeling when someone mentions anything at work or a social setting, and you’re like, “Hm, sounds interesting!” You know that moment when you know you’ve heard the term before, but you don’t have a good understanding of what it actually is. Yeah…. That’s FPGA for me (or at least, it…

  • V.I.T.A. (Variations In The Acronym!)

    V.I.T.A. (Variations In The Acronym!)

    Introducing VITA! – “Vulnerability and Intrusion Threat Analyzer”! … or maybe…. “Virus Identification and Threat Assessment”….. “Verification of Intrusions, Threats, and Anomalies”? Since I cannot seem to settle on one, it’s probably best for you to just pick the one you like best. Throughout one’s pentesting / malware development or analysis journey, one will typically…

  • Conjuring Reverse Tunnels with Ligolo

    Conjuring Reverse Tunnels with Ligolo

    During this OSCP journey I’ve embarked on in the past few months, the topic of tunneling and pivoting was covered. One night I got frustrated using SOCKS and all of those things, so I went to the OSCP Discord channel, where Ligolo came up as a recommended tool for tunneling. I asked Aromak if he…

  • A walk on the blue side: Part 3

    A walk on the blue side: Part 3

    In my previous blog, I show off how I was able to get Wazuh up and running on an Ubuntu VM, 4 agents installed on 4 separate Raspberry Pis, and 1 agent on a Windows 10 VM. I dove into configurations and testing to understand the beginning fundamentals of Wazuh SIEM. The goal of this…

Index