Reading time:
~11 min
Posted
by Rogan Dawes
on
02 December 2019
In this post, I will recap some of the security research conducted on wireless keyboards and mice, and eventually show...
Reading time:
~16 min
Posted
by etienne
on
28 April 2017
Using MS Exchange and Outlook to get a foothold in an organisation, or to maintain persistence, has been a go...
Reading time:
~6 min
Posted
by Rogan Dawes
on
10 March 2017
Categories:
Abuse,
Backdoor,
Build-it,
Conferences,
Empire,
Exploit,
Hardware,
Internals,
Linux,
Metasploit,
Programming,
Real-world,
Research,
Shells,
Tunnelling
(If you’re new to this project, read the intro first) For the past few months, I’ve been working on porting...
Reading time:
~5 min
Posted
by george
on
27 May 2013
Categories:
Backdoor,
Fun,
Howto,
Infrastructure,
Internals,
Linux,
Local,
Post-exploitation,
Shells,
Silly-yammerings,
Tricks
Willems and I are currently on an internal assessment and have popped a couple hundred (thousand?) RHEL machines, which was...
Reading time:
~3 min
Posted
by Dominic White
on
23 November 2012
For our internal hackathon, we wanted to produce some shirts. We ran a competition to see who could produce a...