Remove What-Is-Google-Dorking
article thumbnail

Less SmartScreen More Caffeine: (Ab)Using ClickOnce for Trusted Code Execution

Security Boulevard

The contents of the ClickOnce application manifest will specify what dependencies and other resources will be delivered during the deployment process. The contents of this blogpost was written by Nick Powers ( @zyn3rgy ) and Steven Flores ( @0xthirteen ), and is a written version of the content presented at Defcon30. NET applications.

article thumbnail

Home Is Where the Hack Is

Security Through Education

At one end of the spectrum, we employee search techniques like google dorking, which requires no more than a browser and knowledge about searching with special operators, like ‘+’ and ‘-’. What does each end of the OSINT spectrum have in common? One of Social-Engineer’s services is Open-Source Intelligence Gathering (OSINT).

Hacking 69
article thumbnail

DeepPass?—?Finding Passwords With Deep Learning

Security Boulevard

While exactly what operators are after varies from environment to environment, there is one common target that everyone’s always interested in: passwords. So what’s the exact problem we want to tackle here? DeepPass?—?Finding Finding Passwords With Deep Learning. as of the writing of this post that hasn’t yet occurred.