Bug hunt. Spying devices and how to detect them

Date: 04/05/2020

One might think that bugs from spy movies got obsolete nowadays. Who needs this stuff if microphones and cameras are everywhere – in laptops, smartphones, and zillions of other devices? However, in most cases, it is more difficult to get access to these gadgets than to the physical space where they are located. Here is where miniature, barely visible, and top-notch equipment comes into play. Let’s try to find out whether ordinary people should be concerned about spying tools potentially used against them and what security precautions should be taken, if any.

Read full article →


The great mischief. Working your way to the root flag through IPv6 labyrinths on a Hack the Box virtual machine

Date: 04/05/2020

In this article, I will explain how to gain superuser privileges on Mischief VM available on Hack The Box training grounds. During this journey, you will acquire some SNMP skills, understand the IPv6 routing principles, and learn how to deal with the access control list (ACL) regulating the files and folders permissions. In the end, I will show how to write an ICMP shell in Python and test it.

Read full article →