AI-Powered Application Penetration Testing—Scale Security Without Compromise Learn More

Technical Research

Technical Research

Tastic RFID Thief: Silent, But Deadly

Tastic RFID Thief: Silent, But Deadly

Sep 24, 2014

Silence your Tastic RFID Thief; our blog post shows how you can avoid the loud beep when turning on the RFID hacking tool during your next physical pentest.

By Francis Brown

Technical Research

SearchDiggity: Avoid Bot Detection Issues by Leveraging Google, Bing, and Shodan APIs

SearchDiggity: Avoid Bot Detection Issues by Leveraging Google, Bing, and Shodan APIs

Aug 29, 2014

Google Hacking with SearchDiggity. Leveraging the official APIs of Google, Bing, and SHODAN to avoid bot detection while performing automated scans.

By Francis Brown

Technical Research

Untwisting the Mersenne Twister: How I Killed the PRNG

Untwisting the Mersenne Twister: How I Killed the PRNG

Aug 5, 2014

The Untwister is a penetration testing tool that cracks random number generators. To learn the specifics as well as how it works, read the Bishop Fox blog post today.

By Dan Petro

Technical Research

The Rickmote Controller: Hacking One Chromecast at a Time

The Rickmote Controller: Hacking One Chromecast at a Time

Jul 16, 2014

Chromecast hacking is easy with the Rickmote Controller. Hijack your neighbors' TVs and let the rickrolling begin! Our blog post has the details you need.

By Dan Petro

Technical Research

An Introspection On Intro Security

An Introspection On Intro Security

Nov 1, 2013

Our response to the LinkedIn Intro reaction - reflecting on lessons learned and our experience working with LinkedIn.

By Bishop Fox

Technical Research

Quick Intro to NotInMyBackYard Diggity

Quick Intro to NotInMyBackYard Diggity

Sep 1, 2013

NotInMyBackYard Diggity is part of the larger Google Hacking Diggity Project. Read our blog post to learn what it can do for you.

By Francis Brown

Technical Research

SSL Key Generation Weaknesses

SSL Key Generation Weaknesses

Mar 8, 2012

SSL key generation weaknesses can be avoided (or at least mitigated) - and Carl Livitt from Bishop Fox shows you how in this write-up.

By Carl Livitt

This site uses cookies to provide you with a great user experience. By continuing to use our website, you consent to the use of cookies. To find out more about the cookies we use, please see our Privacy Policy.