Presented by: Jay
In this workshop, we’ll look at the common vulnerabilities found in web applications such as XSS, SQL Injection, CSRF etc and learn how to discover and exploit them.
To join in with the exercises, you’ll need a laptop with a web browser, ZAP or burpsuite and Hackazon running inside a VM.
This workshop is aimed at beginners so if you’re already familiar with web app security, you may not get a huge amount from this (although we’d love for you to come along anyway!
Presented by: Tim
An introductory look at the the various tools and techniques for performing man in the middle attacks, as well as the techniques and tips to defend against them.
The presentation will include a few demos of the tools and a show and tell of devices which can be used to make the attacks easier.
For those new to MitM attacks, this is a very powerful technique used to intercept and modify network traffic (which is why encryption is so important!
Presented by: Tom
A talk by one of our members on the common tools and techniques used to break into a server, starting from enumeration and going to full exploitation.
For anyone wanting to play along, please bring a laptop with Kali installed (a virtual machine is okay - make sure you have the latest version of wpscan by running the command “wpscan –update”) as well as a copy of this vm
Presented by: Jay
Software Defined Radio (SDR) is a cheap and easy way to listen to and interact with radio devices. In this workshop, we’ll look at the capabilities of SDR, discuss common weaknesses in radio systems (such as wireless keyfobs and wireless keyboard) and look into ways these can be exploited with cheap and readily available hardware.
For this workshop, you will need a laptop with gnuradio companion, SDR# or qqrx and capable of running SDR drivers (these should all be available in Kali Linux).
Written by Jay
As a Software Guy ™ I tend to be way more comfortable reversing a binary than following the tracks on a chip and it’s for that very reason that I decided to document the process of hacking home routers the hardware way. The end goal, as always, is and see what kind of access can be gained and ideally get access to some kind of shell with root privileges.
Written by Jay
I wanted to be notified of reddit PMs when all computers were off. Unfortuantly I don’t have a phone which can subscribe to RSS feeds so the solution was to create a couple of (quick and dirty) shell scripts which will blink a LED on a modified Buffalo WHR-G125 router running Tomato firmware.
Soldering is required to attach an LED to an unused output pin. If hardware hacking isn’t your strong point (god knows it’s not mine) you should be able to hijack one of the existing LEDs, such as DIAG or ROUTER.
Antfie - 0001-01-01 00:00:00
Brett Calderbank is a security engineer and member of Manchester Grey hats. Focusing on RE, Threat Intel & other cool blue team things!
Jay Harris - 0001-01-01 00:00:00
Jahmel (Jay) Harris is an ethical hacker and founder of Digital Interuption - A security consultancy in Manchester. He started Manchester Grey Hats to bring together individuals wanting to learn about cyber security.
Paul W - 0001-01-01 00:00:00