El dÃÂa de ayer liberé una nueva versión de la aplicación Mac2wepkey HHG5XX. Esta actualización agrega el campo de “Signal strength” o fuerza de la señal a los resultados de la herramienta.
Descarga mac2wepkey hhg5xx
El dÃÂa de ayer liberé una nueva versión de la aplicación Mac2wepkey HHG5XX. Esta actualización agrega el campo de “Signal strength” o fuerza de la señal a los resultados de la herramienta.
Finalmente ya esta disponible la versión para iOS de “Mac2wepkey HHG5XX”. Esta aplicación requiere “jailbreak” debido a los permisos requeridos para leer la lista de access points.
Kudos a @iunk por aventarse este port!
]]>
I’m very pleased to inform you that “Nmap 6: Network Exploration and Security Auditing Cookbook” is on pre-sale now.
This book is for any security consultant, administrator or enthusiast looking to learn how to use and master Nmap and the Nmap Scripting Engine. It is divided in practical tasks or “recipes” with full code explanations, specific Nmap commands and images to illustrate the topics.
Nmap’s functionality is vast. The following topics are covered in over 120 practical tasks included in this book:
For more recipes, visit the full table of content of ‘Nmap 6: Network Exploration and Security Auditing’.
PacktPub: Nmap 6: Network Exploration and Security Auditing Cookbook
I thought I should let you know that PacktPub offers a porcentage of the sales back to the open source projects such as Nmap. That means that by buying the digital or printed version of this book you also help the Nmap project!
A lot of work is behind this publication and I would like to thank those people who deserve credit for their hard work ( I owe you a beer) :
¿Qué es LectorBunsen?
Es un lector no-oficial del comic Bunsen que se caracteriza por:
Es totalmente gratis! La aplicación esta bajo la licencia GPL y el icono bajo CreativeCommons.
La aplicación usa una librerÃÂa llamada ComicViewer y puedes descargarte el código fuente del siguiente repositorio Github: https://github.com/cldrn/lector-bunsen
Jorge Pinto – Creador de Bunsen
]]>This is a demo I showed a few days ago where we use a path traversal vulnerability to obtain the credentials of a hidden web shell in devices TP-LINK WR740N.
Tuve el placer de participar con hkm en la 7a Semana de la Seguridad Informática del FES Aragón UNAM. Nuestra conferencia tenÃÂa el tÃÂtulo “Análisis de seguridad de ruteados populares en México” y cubrimos estadÃÂsticas de dispositivos populares, asàcomo vulnerabilidades interesantes en ruteadores marcas 2wire, Huawei y TP-Link.
Aquàpodrán encontrar el material de nuestra presentación y de otras buenas conferencias de este evento:
Gracias al equipo organizador por la invitación y a todos los que nos acompañaron por allá.
]]>BCBus is an Android application I developed to have BCTransit’s schedules on my phone for offline access. BCBus is my first Android project and a very important part of my learning experience with the Android OS as I had to play around with layouts, intents, async tasks, row views, sqlite interaction and memory optimization.
I’ve been living in México for over a year now and I simply no longer have the required time to maintain and update this application. For this reason I’d like to share the code with the world and maybe someone will find it useful and learn from it. I also encourage anyone who might be interested in picking up this project to reach out to me for more information.
Since it wouldn’t be fair to you, I will keep up to date the schedules of your current cities. Please contact me to let me know if you are having issues with some of the schedules.
Renata Gomez for helping me with the dashboard icons
Guenther Beyer from androidicons.com for helping me with the design of an awesome icon and graphics for the dashboard
CBC for interviewing me on one of their radio shows and help me spread the word.