EvilZone
Hacking and Security => Tutorials => : Axon May 12, 2013, 02:12:16 PM
-
Abstract: This paper act as a guide explaining the necessity of including Biometric-Devices in the scope of a network audit and the procedures that could be used for Security auditing one such system. The paper explains both local and remote attacks and the procedures to carry out vulnerability detection, exploitation and reporting.
http://upload.evilzone.org/download.php?id=7514981&type=zip
-
O nice share brother it will be much informative. Thankx for sharing .
-
works smooth like a baws! tested it:)
-
works smooth like a baws! tested it:)
What is the type of system you tried this on, optical scanner or capacitance scanner?
-
interesting share, read the first 3 pages so far and it seems very informative +1
-
Thank you for the tutorial! Another good resource on bypassing biometric security can be found here:
http://dasalte.ccc.de/biometrie/fingerabdruck_kopieren?language=en (http://dasalte.ccc.de/biometrie/fingerabdruck_kopieren?language=en)
-GD
-
Thanks for the article! I had read an article in a magazine on the subject and I thought it was very interesting how something such as biometrics that is often viewed as secure to the general public is so flawed and exploitable.