-
Intercepting custom communication protocols in Windows 7
Actually, the title should have been: “Don’t feel lucky and go beyond the first result in a Google search”. I’ve been using EchoMirage for some time but apparently I’ve been using the wrong one. Because when you search for it in Google you normally click the first link. Right? Wrong!
-
Lock-picking, lock-pickers and hacking
I’ve never been that much into lock-picking myself, never quite got too excited by the subject. Until I’ve seen this guy and his awesome presentation. You feel like taking the tools and start practicing on your front door after seeing this. Or on your neighbors door, depending on your preferences and where you want to…
-
Defcon – the movie
Like Hangover with geeks
-
Does it pay to be a BlackHat hacker?
Dan VASILE @DefCamp Bucharest 2013
-
Hacking the WordPress Ecosystem
I delivered a speech at OWASP Romania InfoSec Conference 2013 in Bucharest (I took part in the organization of the event as well). Dan Catalin Vasile – Hacking the WordPress Ecosystem from Dan Catalin VASILE
-
Bug Bounty Programs
-
Building an InfoSec RedTeam
Building an InfoSec RedTeam from Dan Catalin VASILE
-
Change MAC address in iOS for iPhone/iPad
In older versions it used to be as easy as: # ifconfig en0 ether xx:xx:xx:xx:xx:xx For iOS versions >5 you have to resort to nvram: # nvram wifiaddr=xx:xx:xx:xx:xx:xx and then reboot the device. Prerequisite: jailbroken device, terminal access (local or SSH) and sudo.
-
Traffic mirroring in Linux
It comes in hand when analyzing traffic to forward a copy of the traffic to a specific IP where a machine is listening and running Wireshark & stuff. It’s very useful for routers that don’t have the capabilities to run network analysis tools (like DD-WRT). Just run the following commands replacing the xxx.xxx.xxx.xxx field with the…