Reading time:
~17 min
Posted
by Rogan Dawes
on
08 June 2018
Thanks to IoT and other developments, we’re having to review more and more non-HTTP protocols these days. While the hardware...
Reading time:
~3 min
Posted
by Rogan Dawes
on
06 October 2017
Sometimes on an engagement, you’d like to construct a believable certificate chain, that you have the matching private keys for....
Reading time:
~6 min
Posted
by Rogan Dawes
on
10 March 2017
Categories:
Abuse,
Backdoor,
Build-it,
Conferences,
Empire,
Exploit,
Hardware,
Internals,
Linux,
Metasploit,
Programming,
Real-world,
Research,
Shells,
Tunnelling
(If you’re new to this project, read the intro first) For the past few months, I’ve been working on porting...
Reading time:
~8 min
Posted
by Rogan Dawes
on
05 June 2014
This is a tool that I have wanted to build for at least 5 years. Checking my archives, the earliest...
Reading time:
~1 min
Posted
by Haroon Meer
on
30 March 2009
Way back when i was a sysadmin, i recall reading a quote from one of the ATT greybeards who said...