InGuardians Labs

All Your Copy/Paste Are Belong to Us

All Your Copy/Paste Are Belong to Us

  Author: Adam Crompton, Senior Security Consultant Introduction The clipboard functionality of modern operating systems has been around for decades, implemented to provide the ability to take a bunch of 1’s and 0’s and store them temporarily.  In more common...

read more
Sparring Board Version 1.2 – Raspberry Pi Edition

Sparring Board Version 1.2 – Raspberry Pi Edition

Post Author: Don C. WeberTwitter: @cutawayDate Published: 26 July 2013In May 2013 Jay Radcliffe decided that he wanted InGuardians to do something special for Black Hat USA 2013 and DefCon 21 and thus Sparring Board Version 1.2 - Raspberry Pi Edition (SBv1.2) was...

read more
Protecting the Mr Robot Vuln Hub Machine – Part 2 – Confining WordPress with AppArmor

Protecting the Mr Robot Vuln Hub Machine – Part 2 – Confining WordPress with AppArmor

This blog post, focusing on attack and defense using AppArmor, continues to walk you through an attack on a Linux-based capture-the-flag (CTF)-style system and then shows you how you could defend it without stripping out the vulnerabilities. We escalate privilege to capture more flags, then use AppArmor to break our attack. This is the sequel to Protecting the Mr Robot Vuln Hub Machine – Part 1 – Breaking a Password Spray with OSSEC Active Response.

read more
Protecting the Mr Robot Vuln Hub Machine – Part 1 – Breaking a Password Spray with OSSEC Active Response

Protecting the Mr Robot Vuln Hub Machine – Part 1 – Breaking a Password Spray with OSSEC Active Response

This blog post walks you through an attack on a Linux-based capture-the-flag (CTF)-style system and then shows you how you could defend it without stripping out the vulnerabilities. We use OSSEC to detect a password spray in progress and automatically break it. In the next in this series, we’ll use escalate privilege to capture more flags, then AppArmor to break our attack.

read more
Make your Tastic Fan-Tastic

Make your Tastic Fan-Tastic

Here at InGuardians, we are huge fans of the Tastic HiD card long-range reader. Designed and implemented by Bishop Fox, this long-range RFID reader allows us to silently and stealthily acquire sensitive data from things like employee badges, and has become a huge...

read more
Radio Communication Analysis using RfCat

Radio Communication Analysis using RfCat

Original Post Author: Don C. Weber [Twitter: @cutaway] Original Date Published: 15 Oct 2013 Many people think RfCat is a very cool concept. The thought of monitoring and interacting with sub-gigahertz radio is very sexy. Hell, it IS sexy. Then people get an IM-ME, a...

read more
The Ultimate Arduino GPS Clock (UAGC) – Part 1

The Ultimate Arduino GPS Clock (UAGC) – Part 1

Original Post Author: Tom Liston [Twitter: @tliston] Original Date Published: 11 June 2013 Doing a Google search for "arduino GPS clock" turns up more than a few other projects that use the time information found within the NMEA data provided by a GPS signal to...

read more

@InGuardians

LIVE WEBINAR Thursday Feb 21 12PM PST | 3PM EST Adam Crompton @3nc0d3r is dropping a new set of tools for #RedTeam operations. Demo-heavy webinar... you don't want to miss! Register here: inguardians.com/webinars/ pic.twitter.com/kwmb6094Sj

About 4 days ago from InGuardians™'s Twitter via Twitter Web Client

Categories