TP-Link Archer T2U Nano for TLS Traffic Interception

Overview In this guide we’ll be going through the process of configuring an intercepting set-up using mitmproxy and a wireless network, to inspect, modify and monitor encrypted HTTPS traffic. This will allow for a simple way to analyse traffic on mobile handsets and IoT devices, with the only requirements is Wi-Fi support and the ability to install custom certificates. mitmproxy is your swiss-army knife for debugging, testing, privacy measurements, and penetration testing....

November 10, 2019 · 6 min · Naz Markuta

Live Memory Acquisition on Linux Systems

In this blog post I’ll be demonstrating a process of obtaining or acquiring a memory image from a running Linux system. The tool of choice LiME (Linux Memory Extractor) and is available on Github. After a forensic image has been acquired we will use Volatility with a custom Linux profile for the analysis, to keep things simple I’ve used the latest Debian Stretch kernel version 4.9.0-8-amd64 as the target system so it’s easily repeatable....

August 26, 2018 · 6 min · Naz Markuta