Assemblies Modification We can arbitrarily modify assemblies, by using this technique to add debugging statements to a log file or alter an assembly’s attributes in order to better debug our targe...
Debugging One of the best ways to understand an application is to run it through a debugger, which allows us to inspect application memory and call stacks. This information can be invaluable when ...
As is always the case when we have access to the source code, we first like to just look around and get a feel for the application. How is it organized? Can we identify any coding style that can he...
HTTP Request The following script will issue an HTTP request: import requests from colorama import Fore, Back, Style proxies = {'http':'http://127.0.0.1:8080','https':'http://127.0.0.1:8080'} req...
DnSpy We use dnSpy and attempt to decompile an executable’s code. We’ll drag the test.exe file to the dnSpy window, which automatically triggers the decompilation process in dnSpy. To view the ...
Técnicas para capturar un Handshake A continuación, se representan distintas técnicas con el propósito de capturar un Handshake de la red fijada como objetivo. Ataque de deautenticación dirigido ...
WEP Fake Authentication Attack # Monitor Mode airmon-ng start wlan0 # Capturing Traffic airodump-ng –c <Canal_AP> --bssid <BSSID> -w <nombreCaptura> wlan0mon # Identifying our ow...
Basics WPA Enterprise uses Extensible Authentication Protocol (EAP) Authentication is done using a Remote Authentication Dial-In User Service (RADIUS) server. Authentication to a RADIUS serv...
Attacking Captive Portals Captive portals are often set up on unencrypted or open networks to allow guests or employees to easily connect to the network or Internet, sometimes without credentials. ...
A rogue AP is an AP in use that has not been authorized by a local network administrator. This could take the form of an AP plugged into a network without the administrator’s knowledge. Creating a...