by cyberviking | Mar 22, 2021 | Research
Really... A Challenge?? Taking the Challenge shown in the movie Snowden There will be no scripts included in this post, if you are someone who knows about networking, Linux and python you should be easily able to replicate or rebuild the scripts explain in this post....
by cyberviking | Sep 6, 2020 | Research
Facebook "Spam" DoS Using Spam to Spam and Crash FB Messenger 2018 Some may look at the Tittle and think ohhhh they found a way to do a Denial of Service (DoS) by some new fancy spearphishing attack… well you would be 100% amazing and...
by cyberviking | Sep 5, 2020 | Research
Self Repairing Server Automated Self Repairing Server Using Jenkins Automation The original project was designed around the idea of having a training environment for new employees to the Red Team, the idea was to give them a safe place to practice skills in a variety...
by cyberviking | Sep 5, 2020 | Research
Voice Recognition Attack Vector An Attack Vector design based on the idea of a viral marketing campaign by Burger King The Theory Software advances in Voice Recognition continue to improve as does the list of applications from commercial answering machines with help...
by cyberviking | Sep 4, 2020 | Research
Hacking Via Dance The Absolutely Craziest Proof Of Concept for an Attack Vector I have ever taught up While I was in TheManyHatsClub voice call one Friday night, one of the other members of the call that goes by Chrissy Morgan was talking about a talk they submitted...
by cyberviking | Aug 19, 2020 | Research
Hacking Finger Print Readers Breaking GSA Certified Finger Print readers model FUTRONIC Finger Print Scanner model: FS88 Avilable to purchase from the following location: https://www.bayometric.com/futronic-fs88-fips201piv-usb-2-0-fingerprint-scanner/ So as...