Quantcast
Channel: Infobyte Security Research Labs
Browsing all 236 articles
Browse latest View live

Datos para robar casas a través de Internet

Entre el 3 y 10 de enero, Página/12 detectó 8623 tweets de porteños que decían estar fuera y un cruce con la guía Telexplorer arrojó gran cantidad de coincidencias con casas vacías. El uso de Google...

View Article


Image may be NSFW.
Clik here to view.

Programa Nacional de Infraestructuras Críticas y Ciberseguridad en Argentina

La Presidencia de la Nación, a través de la Jefatura de Gabinete de Ministros, nos ha honrado invitando a Infobyte Security Research a participar del GESI, “Grupo de Expertos en Seguridad y Legislación...

View Article


Image may be NSFW.
Clik here to view.

National program of critical infraestructures and cybersecurity in Argentine

The presidency of our nation through the cabinet of ministers has honoured us inviting Infobyte Security Research to participate in GESI, a "Group of Experts on Security and Computer Law ". The...

View Article

Bypassing WAFs with non-alphanumeric XSS.

pre { overflow-x: auto; } This post is an attempt to expand what we already discussed on Patricio’s blog, but with a focus on security in web applications. Although this post will not be a shocker, I...

View Article

Image may be NSFW.
Clik here to view.

Review Ekoparty Security Conference 2012

Luego de mas de un mes de finalizada la Ekoparty Security Conference 2012 y con tiempo para ver la repercución que generó la octava edición. Hicimos este review para todos aquellos que vivieron y...

View Article


Upgrading! Yes even us!

We are quite happy to announce the release of our new website, providing an easier access to our researches and news. Additionally we have created a repository in Git Hub (https://github.com/infobyte)...

View Article

Pivoting with Evilgrade

Even five years Evilgrade was first released some vendors haven't fixed their products yet. I don't know why.One of the early development decisions (besides it's modular design) was towrite Evilgrade...

View Article

Pivoteando con Evilgrade

Incluso 5 años después del lanzamiento de Evilgrade algunos empresas aun no parcharon sus productos. No sabemos porque...Una de las primeras decisiones del desarrollo (aparte de su diseño basado en...

View Article


Image may be NSFW.
Clik here to view.

GO Deep Pro (1 of 2)

GO Deep ProAnalyzing GoPro's WIFI.In this little post we are going to analyze the traffic of this tinny but powerful camera: GoPro Hero 3.May be there is someone that did not know but the GoPro's serie...

View Article


Image may be NSFW.
Clik here to view.

Go Deep Pro (1 de 2)

GO Deep ProAnalizando el WIFI de la GoProEn esta pequeña entrada analizaremos el trafico de portátil, diminuta pero potente GoPro Hero 3.Por ahí alguno aun no lo sabe, pero las nuevas GoPro Hero en su...

View Article

Image may be NSFW.
Clik here to view.

Perverting embedded devices - Lexmark N4000e Print Server (Part - I)

Lexmark n4000e - Print ServeDuring an engagement it's normal to find a number of embedded devices, access controllers, faxes, routers, print servers, etc. Their presence is often overlooked but from an...

View Article

Image may be NSFW.
Clik here to view.

Release: Faraday Penetration Test IDE

We are happy to announce our first release ofFaraday (beta), an open source collaborative Penetration Test IDE console that uses the same tools you use every day.Faraday introduces a new concept (IPE)...

View Article

Faraday Developer Awards

After 3 years of development, we are releasing Faraday, a Multiuser Penetration Test IDE, Designed for collaborative data sharing, indexation and analysis of the generated knowledge during the...

View Article


Image may be NSFW.
Clik here to view.

Faraday's New features: ZSH and Command History

We are back in our journey to the perfect collaborative pentesting tool, a Multiuser Penetration Test IDE, designed for collaborative data sharing. AKA Faraday!We are proud to present two new features...

View Article

Image may be NSFW.
Clik here to view.

Another way to bypass McAfee detection

During a penetration test we obtained the complete administration of a Windows server.We were looking for a way to get more information on this server and wanted to use the technique pass-the-hash...

View Article


Image may be NSFW.
Clik here to view.

Faraday MacOS Support

We're proud to announce that we finally have Faraday running on Mac OSX.It took some tweaking in order to make it work (Multiprocessing queues differ between Mac OS and Linux), but now it's fixed, so...

View Article

Image may be NSFW.
Clik here to view.

Divide and conquer: modern collaborative pentesting Training in Shakacon VI

Hi everybody! Wondering what neat course to take in mid-june?Join us in Shakacon for this cutting edge training.We aim to introduce each attendee to the most crucial pentesting phases, collaborative...

View Article


Image may be NSFW.
Clik here to view.

Ekoparty 2011 review

Una nueva edición de la Ekoparty Security Conference se reallizó este año en los días 21, 22 y 23 de Septiembre, en Buenos Aires, Centro Cultural Konex.Si bien el Konex fue el mismo lugar donde se...

View Article

Image may be NSFW.
Clik here to view.

Faraday new features

Hello again Faraday followers! We are continuously improving Faraday, and we have a new set of features and updates to show you.First, we added new visualizations on the web interface. You can see now,...

View Article

Image may be NSFW.
Clik here to view.

Ekoparty 2011 review

Una nueva edición de la Ekoparty Security Conference se reallizó este año en los días 21, 22 y 23 de Septiembre, en Buenos Aires, Centro Cultural Konex.Si bien el Konex fue el mismo lugar donde se...

View Article
Browsing all 236 articles
Browse latest View live


<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>