Datos para robar casas a través de Internet
Entre el 3 y 10 de enero, Página/12 detectó 8623 tweets de porteños que decían estar fuera y un cruce con la guía Telexplorer arrojó gran cantidad de coincidencias con casas vacías. El uso de Google...
View ArticlePrograma Nacional de Infraestructuras Críticas y Ciberseguridad en Argentina
La Presidencia de la Nación, a través de la Jefatura de Gabinete de Ministros, nos ha honrado invitando a Infobyte Security Research a participar del GESI, “Grupo de Expertos en Seguridad y Legislación...
View ArticleNational program of critical infraestructures and cybersecurity in Argentine
The presidency of our nation through the cabinet of ministers has honoured us inviting Infobyte Security Research to participate in GESI, a "Group of Experts on Security and Computer Law ". The...
View ArticleBypassing WAFs with non-alphanumeric XSS.
pre { overflow-x: auto; } This post is an attempt to expand what we already discussed on Patricio’s blog, but with a focus on security in web applications. Although this post will not be a shocker, I...
View ArticleReview Ekoparty Security Conference 2012
Luego de mas de un mes de finalizada la Ekoparty Security Conference 2012 y con tiempo para ver la repercución que generó la octava edición. Hicimos este review para todos aquellos que vivieron y...
View ArticleUpgrading! Yes even us!
We are quite happy to announce the release of our new website, providing an easier access to our researches and news. Additionally we have created a repository in Git Hub (https://github.com/infobyte)...
View ArticlePivoting with Evilgrade
Even five years Evilgrade was first released some vendors haven't fixed their products yet. I don't know why.One of the early development decisions (besides it's modular design) was towrite Evilgrade...
View ArticlePivoteando con Evilgrade
Incluso 5 años después del lanzamiento de Evilgrade algunos empresas aun no parcharon sus productos. No sabemos porque...Una de las primeras decisiones del desarrollo (aparte de su diseño basado en...
View ArticleGO Deep Pro (1 of 2)
GO Deep ProAnalyzing GoPro's WIFI.In this little post we are going to analyze the traffic of this tinny but powerful camera: GoPro Hero 3.May be there is someone that did not know but the GoPro's serie...
View ArticleGo Deep Pro (1 de 2)
GO Deep ProAnalizando el WIFI de la GoProEn esta pequeña entrada analizaremos el trafico de portátil, diminuta pero potente GoPro Hero 3.Por ahí alguno aun no lo sabe, pero las nuevas GoPro Hero en su...
View ArticlePerverting embedded devices - Lexmark N4000e Print Server (Part - I)
Lexmark n4000e - Print ServeDuring an engagement it's normal to find a number of embedded devices, access controllers, faxes, routers, print servers, etc. Their presence is often overlooked but from an...
View ArticleRelease: Faraday Penetration Test IDE
We are happy to announce our first release ofFaraday (beta), an open source collaborative Penetration Test IDE console that uses the same tools you use every day.Faraday introduces a new concept (IPE)...
View ArticleFaraday Developer Awards
After 3 years of development, we are releasing Faraday, a Multiuser Penetration Test IDE, Designed for collaborative data sharing, indexation and analysis of the generated knowledge during the...
View ArticleFaraday's New features: ZSH and Command History
We are back in our journey to the perfect collaborative pentesting tool, a Multiuser Penetration Test IDE, designed for collaborative data sharing. AKA Faraday!We are proud to present two new features...
View ArticleAnother way to bypass McAfee detection
During a penetration test we obtained the complete administration of a Windows server.We were looking for a way to get more information on this server and wanted to use the technique pass-the-hash...
View ArticleFaraday MacOS Support
We're proud to announce that we finally have Faraday running on Mac OSX.It took some tweaking in order to make it work (Multiprocessing queues differ between Mac OS and Linux), but now it's fixed, so...
View ArticleDivide and conquer: modern collaborative pentesting Training in Shakacon VI
Hi everybody! Wondering what neat course to take in mid-june?Join us in Shakacon for this cutting edge training.We aim to introduce each attendee to the most crucial pentesting phases, collaborative...
View ArticleEkoparty 2011 review
Una nueva edición de la Ekoparty Security Conference se reallizó este año en los días 21, 22 y 23 de Septiembre, en Buenos Aires, Centro Cultural Konex.Si bien el Konex fue el mismo lugar donde se...
View ArticleFaraday new features
Hello again Faraday followers! We are continuously improving Faraday, and we have a new set of features and updates to show you.First, we added new visualizations on the web interface. You can see now,...
View ArticleEkoparty 2011 review
Una nueva edición de la Ekoparty Security Conference se reallizó este año en los días 21, 22 y 23 de Septiembre, en Buenos Aires, Centro Cultural Konex.Si bien el Konex fue el mismo lugar donde se...
View Article