First off, credit for this work goes to n3k @kiqueNissim and X_Typhon @lintuxt who produced an excellent paper here.
These notes are not to take anything away from the two mentioned above but are purely for my own reference (I find writing things up helps me to remember it), I strongly suggest reading the white paper as it goes into much more detail than I will here.
So on… Continue reading
So I got bored this evening and decided to write a quick and simple python SSH bruteforcer (I wanted to learn how to use paramiko).
It takes the dictionary in a user:pass format.
It’s not the most efficient as it uses a sleep (300ms) function, if i get the time to play i’ll use some form of thread queuing to ensure that you can throttle the requests. Might also be… Continue reading
OK, so at my work place we’ve just got some new laptops and they have a proper GPU for a change (we’ve in the past had intel GPUs). I was lucky enough (or unlucky enough) to be given the job of spec’ing these laptops and my hunt was to include a decent GPU for hash cracking. I strived for an ATI chip but with budget in mind and with the… Continue reading
So I already have CCTV around the house and I was wondering just how cheaply I could add a few more cameras to my existing system using some webcams I have left over.
So the first thing you’ll need to do is set up a basic raspbian system, I wont cover the details of those steps as they are outlined in numerous other locations.
For reference this setup was built… Continue reading
Okay, so the first thing you’re wondering is “Why the hell would you want to do this?”
Well the answer becomes more obvious when the scenario is set: You’re on a social engineering job and you’ve managed to gain access to the target building, you walk around for a bit to see if any of the desks look free. After a while you decide to sit down at… Continue reading