The best socket injection system just got better Socket injection is big fun for sure. Easily drop XSS-based attacks on victim browsers with a simple regex, inject payloads within SMTP/POP emails, or simply embed raccoon pictures in every web page. However, static strings can only take us so far. There comes a point when we start thinking it would be nice for the string to be a bit more flexible, maybe even dependent on specific conditions for each injection. This is taking us into the realm of dynamic injection. Introducing dynamic injection Instead of simply asking Syphoon to insert some...
How secure are your networks? Artio shines a new light on your network to reveal things no other solution can see. Built on our experience with network intrusion, this next-level detection system can identify threats previously kept under the radar. Detect NAC bypass, ghosting, MAC cloning, poisoning and more Artio is the first commercially-available solution to detect Ethernet ghosting / NAC bypass. Artio also detects network scans, partial ghosting / MAC theft, poisoning / MITM (Man-In-The-Middle) and more. Simple integration Artio is packaged as a standard 19" rack-mount unit (1U), with a short depth of only 230mm (including power connector). Detection...
Your favorite switch just got even better The Skunk gets a new version for 2022! Still providing the same features you know and love, the software remains the same but the hardware has had some visible changes. Probably the most obvious is the move from the classic green soldermask to a fresh purple. Some changes are not just cosmetic though: the physical footprint has been reduced quite a bit. From 84x75 mm down to 75x61 mm, the Skunk just got a 27% size reduction. It now takes even less space in your hacker backpack or toolbox. This becomes pretty obvious when...
Weapons-grade MitM Syphoon is a MitM (Man-in-the-Middle) tool - it abuses the network to redirect communications from other hosts through itself. This allows sniffing as well as manipulation of communications between hosts on the network. Beat the network into submission When thinking about MitM, the first thing that comes to mind is often sniffing passwords out of clear-text exchanges. This is a gross oversimplification of what Syphoon is capable of. MitM is only the beginning - Syphoon offers a wide range of tools to extract information, manipulate exchanges, strip SSL, redirect network flows and more. Written exclusively in C and optimized...
A delicate situation Sometimes you need to hook something behind a device in a corporate network. Unfortunately, sometimes that device turns out to be an IP phone or video camera only powered through PoE. Unless there's a spare power supply lying around that just happens to match the device, this can mean the difference between a successful intrusion or an embarrassing moment. An easy solution The solution to this is the Sparkplug - a tiny PoE injector capable of powering devices up to 15W. On one side, hook up the included wall adapter and the PoE device. On the other...
- 3D print
- Swiss day