How does one go about creating new tools and toolchains?
In “Sweet Tools O’ Mine” from t2’16Hugo Teso shares his approach for creating an offensive toolkit, which contains both hardware and software parts. Learning by doing, when to leverage the power of existing solutions, and when to create your own are all discussed throughout the video.
If you are serious about offense, this is a presentation for you.
Iaitō, a GUI for radare2 reverse engineering framework is available on GitHub.
We’re continuing with the theme of securing international travel by releasing Andrea Barisani‘s Forging the USB Armory talk from t2’15.
Those enjoying international travel and/or operational situations, the dual-use capabilities of the platform might be something of interest. From safe USB charger, encrypted file storage and automated self-destruct, password manager, TOR access point to portable offensive toolkit, the opportunities are endless. Even if open source hardware design is outside your comfort zone, the video gives you a good glimpse into solving hard problems and the capabilities of USB Armory.
Again, as with all our curated releases, this is a must see – enjoy!
If you want to learn how to apply defensive measures to protect offensive operations and your capabilities, Jacob Torrey’s “Nano-Scale Red Teaming: Making REs Cry With Device-Specific Opaque Execution” from t2’16 is the presentation to watch.