Security Blog

Discover our latest blog posts on security. Find updates on your favorite tools, expert tips, and industry tricks to stay ahead in the field.


Jun 23

Understanding Protected Management Frames

Author: TheXero | Category: blog

Discover the importance of Protected Management Frames (PMF) in Wi-Fi networks. Learn how PMF secures management frames, preventing tampering and unauthorised injections. Explore the different configuration states of PMF and understand its role in enhancing Wi-Fi security. Stay tuned for our next post on how attackers defeat PMF and how to protect your network against advanced threats.


Read More
May 13

The inevitable future of WiFi

Author: TheXero | Category: blog

But here's the kicker, WiFi isn't just about checking your Instagram feed or sending off that last-minute report. Nope, it's way bigger than that. Businesses are ditching those clunky on-site servers faster than you can say `cloud computing.`


Read More
May 07

WiFi Attacks Specialist Course

Author: TheXero | Category: blog

Our WiFi Attacks Specialist course is designed to take a new comer to WiFi to reach the status of WiFi Penetration Tester in the quickest time possible. The course features an interactive lab environment, turning the taught theory into practical hands-on experience with our world-class lab environment.


Read More
Nov 12

Building A Compact XOR Encoder

Author: TheXero | Category: blog

The majority of memory corruption exploits that exist, have some form of input character limitation. To get around these limitations, you have what is known as an encoder. By encoding the input ...


Read More
May 09

Worldmail Exploit

Author: TheXero | Category: exploit-development

The first public exploit we released was for the Eudora Qualcomm IMAP server commonly known as Worldmail. This exploit was classified as a Structured Exception Handler (SEH) buffer ...


Read More
May 03

nullsploit engine

Author: TheXero | Category: tools

The nullsploit engine is a work in progress exploitation framework. Currently only a limited number of exploits are available, but these should be stable across multiple Windows installations. Features...


Read More
Sep 28

Housing Technology Interview

Author: TheXero | Category: blog

Recently, I was interviewed by Housing Technology magazine, about what housing providers should be considering in the context of cyber-security and data protection. The full aricle can be ...


Read More
Jun 07

conscan updated

Author: TheXero | Category: blog

Its been a while since an update to conscan has been made since it’s initial release last October. The new update introduces two new features Username disclosure Single threaded account brute-forcing...


Read More
May 04

BSides London Exploit Development

Author: TheXero | Category: blog

BSides London 2014 last week was my first attempt at teaching an exploit development class a group of people which I had never met before. On the whole, the handson 1 hour workshop I ran on Stack Based ...


Read More
Aug 31

SSL Private Key Password Cracker

Author: TheXero | Category: tools

Following a recent pentest I performed for a client I stumbled upon their private SSL certificate. The SSL key was password encrypted, thus could not be used directly without knowing...


Read More
Apr 15

Automated HTTP Enumeration

Author: TheXero | Category: tools

A tool I’ve been writing to enumerate the enabled HTTP methods supported on a webserver. Currently only in the initial beta stage, but includes basic checking of files including the...


Read More
Mar 25

TFTP Fuzzer

Author: TheXero | Category: tools

A simple TFTP Fuzzer I wrote to discover undisclosed bugs within TFTP servers and other simple UDP based protocols. The project is hosted on GitHub and can be found at...


Read More
Jan 27

FTP Fuzzer

Author: TheXero | Category: tools

This FTP fuzzer has been used to fuzz and discover a number of previously undisclosed bugs with FTP server software and other plain-text protocols. The project is hosted on GitHub...


Read More
Oct 26

Abusing The Stack

Author: TheXero | Category: exploit-development

Abusing the Stack is a full tutorial, detailing the process of vulnerability discovery to developing custom exploit code to take advantage of a vulnerability. Once you have successfully been through...


Read More
Nov 14

Hacking Hidden WiFi Networks

Author: TheXero | Category: wifi

Typically a WiFi network can be configured to not broadcast its SSID. In this episode, we will be attacking a hidden WiFi network. Firstly after activating monitor mode on my...


Read More
Oct 29

ARP Amplification

Author: TheXero | Category: wifi

An advanced technique known as ARP Amplification can greatly increase IV generate rates. Using this technique alone is enough to boost IV generation rates up to 1800p/s. I first performed...


Read More
Sep 19

Bypassing Shared Key Authentication

Author: TheXero | Category: wifi

When attacking a WEP encrypted WiFi network you can come across two different authentication methods, Open and Shared Key Authentication. In the previous example, we attacked a WEP network configured...


Read More
Sep 10

Hacking WEP Protected Networks

Author: TheXero | Category: wifi

When hacking a WEP protected WiFi network an attacker may conduct an ARP Request Replay attack against the affected network. There are cases where is not likely to succeed, such...


Read More
Aug 29

Hacking WPA

Author: TheXero | Category: wifi

In this video, I demonstrate the simplicity of cracking a PSK password using tools freely available within the aircrack-ng suite of tools. I first put my Alfa AWUS036H USB WiFi...


Read More