Windows information gathering using Powershell: a brief cheatsheet

During a penetration test, once you get a local access to a target, you should start a local assessment of the machine in order to plan a correct tactic for privileges escalation and lateral movement.

Continue reading “Windows information gathering using Powershell: a brief cheatsheet”

USBSamurai: how to make a remote controlled USB HID injecting cable for less than 10$

An interesting article by Luca Bongiorni explains how to create a remote controlled HID injector cable using some simple hardware components easily purchased on online stores (with less then 10$)

Continue reading “USBSamurai: how to make a remote controlled USB HID injecting cable for less than 10$”

Reverse engineering and penetration testing on iOS apps: my own list of tools

After a post focused on Android, another list of tools useful for penetration testing and reverse engineering of iOS applications.
Also all this tools are OSS and freely available.

Continue reading “Reverse engineering and penetration testing on iOS apps: my own list of tools”

Reverse engineering and penetration testing on Android apps: my own list of tools

This list of tools is really useful both in penetration testing on an Android application and in reverse engineering of a suspicious application.
All tools are OSS and freely available: so, enjoy!

Continue reading “Reverse engineering and penetration testing on Android apps: my own list of tools”