This is Wendel Guglielmetti Henrique's Typepad Profile.
Join Typepad and start following Wendel Guglielmetti Henrique's activity
Join Now!
Already a member? Sign In
Wendel Guglielmetti Henrique
Ribeirão Preto - Sao Paulo - Brazil
Wendel Guglielmetti Henrique is a Senior Security Consultant at Trustwave's SpiderLabs. Wendel has over 12 years experience in Information Technology, where the last 7 years were dedicated to penetration testing. He has performed security focused code reviews, secure development training, forensics analysis and security assessments. He has performed countless network, application and web application penetration tests for various organizations across the globe, including government, banking, commercial sectors, as well as the payment card industry. Recent presentations include RSA Conference 2012 (USA), ToorCon 13 (USA), Defcon 19 (USA), Black Hat Arsenal 2010 (USA), OWASP AppSec Research 2010 (Sweden) and Black Hat Europe 2010 (Spain). Previously, he spoke in Troopers 09 (Germany), OWASP AppSecEU09 (Poland), YSTS 3.0 (Brazil), and has spoken in well known security conferences such as Defcon 16 (USA) and H2HC (Brazil). He developed a tool to detect and remove the infamous BugBear virus, before most of the antivirus companies around the world in 2002. During his career, he has discovered vulnerabilities across a diverse set of technologies including webmail systems, wireless access points, remote access systems, web application firewalls, IP cameras, and IP telephony applications. Some tools he wrote already were used as examples in national magazines like PCWorld Brazil and international ones like Hakin9 Magazine. He co-authored patent-pending penetration testing technology.
Interests: Hacking, Security, Exploits, Phishing, Network Attacks, Client-Side attacks, Social Engineering, Penetration Test, Wireless hacking, Pen-Test
Recent Activity
Hello Ridingintraffic, Thanks for your comment, very appreciated. Personally I can't agree or disagree, since both my cards (Gigabyte and XFX) have pretty much the same speed and temperature and in comparison with public benchmarks using the same version of hashcat and driver it's not bad. I acquired these cards because they were used just 2 weeks and I got a really good price, almost the same that I would pay for a AMD Radeon 7970 :) I have seen powered USB PCI risers before and I considered them, however I avoided them for a few reasons: 1) I wanted a clean setup on a chassis with decent cable management and with minimum complexity (no adapters, workarounds or several cheaper cards to get similar performance). In my opinion, as much complexity you add, more trouble you will have in future. 2) Air cooling was a major concern, and while have 4, 6 or 8 cheap cards could appear nice and profitable. However, in general the old used cards were sacrificed for a long time mining and performance is not great, also keep a decent air cooling with a lot of cards is hard depending of your chassis and cooling setup, obtaining a really good chassis for this setup will be expensive, so, in my opinion it's not a good choice, but I respect different opinions. One thing that is interesting, I have seen better temperature benchmarks with proper chassis setup in comparison with Open Chassis. Yet talking about air cooling, the objective is to be able to remove hot air from the components such as GPU cards and push cold and fresh air from environment to the components, which could be hard when you have an open chassis or bad chassis / fan setup. Obviously we are talking about a room with controlled temperature, because if it's too hot there is nothing that will avoid issues with air-cooling. :) Talking about mining, I don't know where you live, but with a GPU setup like the one that you mentioned here I can't pay the electric bill, air conditioning and the GPU cards neither mining for years, without taking in consideration the complexity / difficulty that increased very fast and make it hard. If someone wants to go mining, I would advise to go with proper hardware such as an application-specific integrated circuit (ASIC) to try obtaining any profit. Again, thanks for your valuable comments. Best regards.
Hi Intercepter Ng, Great job and thanks for the heads-up. I follow your project for a long time and I enjoy it. I always keep my eyes open to see the console edition improvement since I only use Linux based system for internal penetration tests. I hope to have a console edition with all features such as the Windows version :) The SMB hijack technique is a nice implementation, a few years ago Steve Ocepek and I discussed it during our Thicknet (https://github.com/SpiderLabs/thicknet) presentation and we considered implementing it, nice to know you did it. Keep the great work. Thanks.
Wendel Guglielmetti Henrique is now following The Typepad Team
Aug 14, 2012