Profile cover photo
Profile photo
James Jara (Hacker Lifestyle)
45 followers
45 followers
About
Posts

Post has attachment
netstat with awk logger
With this script you can log any suspicious traffic out your boundaries ports: netstat -ant | grep 'tcp' | awk '{
split($4,p1,":")
split($5,p2,":")
#if(p2[1]=="0.0.0.0" || $5==":::*") next
if ( p2[2] < 3000 || p2[2] > 4000 )
print $4","$5","$6
}
' > ...
Add a comment...

Post has attachment
2nd Place, CR Hacking Challenge CTF
2nd Place, CR Hacking Challenge CTF , thanks @radware @checkpoint for the opportunity :)
Add a comment...

Post has attachment
xss in sandboxed javascript
XSS in sandboxed javascript. bypassing JS  proxy // Proxing the Alert and more.. (eval, etc) (function () {
/*
XSS prevention via JavaScript
*/
var XSSObject = new Object();
XSSObject.lockdown = function (obj, name) {
if (!Str...
Add a comment...

Post has attachment
wireshark decode retransmissions duplicate-address-frame
Config wireshark: - show columns: 1. ethernet destinations 2. ethernet source Detecting arp duplicated address  arp.duplicate-address-frame 2. ethernet source F2 99 = GATEWAY OR ATTACKER D0 03 44 01 The attacker changes the traffic between client and server...
Add a comment...

Post has attachment
Analysing USB traffic protocol decoder from a pcap Wireshark
7 minutes ago More free #USBHID protocol, it finds the "Leftover Capture Data: " from a Dump #wireshark and outputs readable string #infosec thanks KrisztiánVa USB-traffic-protocol-decoder Analysing USB traffic protocol decoder from a pcap Wireshark 1. Filt...
Add a comment...

Post has attachment
Extracting and decrypting data wireshark
Wireshark was compiled with GnuTLS and Gcrypt support ssh -p user@ 'tcpdump -s0 -U -n -w - ' | wireshark -k -i - exports keys: File -> Export Objects -> HTTP S elect a HTTP packet from the conversation and go to Analyze -> Follow HTTP stream.
Add a comment...

Post has attachment
Training Software development and information security 2017
Minutes of all my training for this year related to software development and information security. Never Quit, james jara February: Algorithms  HackerRank - Algorithm -   Data Types HackerRank - Algorithm -   operators HackerRank - Algorithm -   Conditional...
Add a comment...

Post has attachment
Practical Race Condition Vulnerabilities in Web Applications
Practical Race Condition Vulnerabilities in Web Applications What are Race Conditions? Race conditions in software are when two concurrent threads of execution access a shared resource in a way that unintentionally produces different results depending on th...
Add a comment...

Post has attachment
AWS IoT - Internet of Things on Amazon Web Services
AWS IoT - Internet of Things on Amazon Web Services I'd like to announce AWS IOT which is helps you build IOT applications wereally make it easy for you to actually built Internet of Things applicationsthese things are really important of course the devices...
Add a comment...

Post has attachment
Add a comment...
Wait while more posts are being loaded