In this video I go through the process of setting up an SSH tunnel to hide an IP and also setting one up to create a simple router, in this case, on a dual-homed host. The second instance could also be used to route traffic through an encrypted channel on an unexpected port. For example, it could be used to route IRC traffic through port 80 to avoid a network policy. In addition to the demonstration of setup, I analyze traffic from the points of view of the browsing computer, the host for the tunneling, and the recipient of the tunneled traffic.
Most Recent Articles
This is a writeup of the format string vulnerability in level 4 of the 64bitprimer VM from vulnhu
Installation of the software to make a yubikey 4 work in FIDO U2F mode on Debian Jessie i386
Lesson(s) learned
This one stumped me. Overall, it was a great competition for me as I got to learn a whole lot of new things. I had never worked on a Mac, other than as a user, had never used Hopper, lldb or any of the other tools for reversing on a Mac, and haven't got any experience in the Objective C/Swift framework.
4 rounds, lots of debugging
Videos
Explains the workings of a DMZ, walks through setting up and testing of a DMZ in a virtual machine lab environment
In this video I go through the process of setting up an SSH tunnel to hide an IP and also setting
Useful for someone who is interested in what a buffer overflow is. Does not go into the details of development, just explains generally and demonstrates the use of one.
a demonstration of a vulnerability discovered and published by Muts in 2004, exploited on a Windows XP SP3 machine using Python, Immunity Debugger, and Metasploit.
In this video I demo some simple iptables rules and show them how to perform network traffic analysis to test them out.