• News
  • Mobile
  • Security
  • Malware
  • Coding
  • Unix
  • DevOps
  • Log In
  • Sign Up
  • No bullshit
  • Cookie Policy
  • Privacy Policy
Log In / Sign Up

Month: 26.03.2023

Attacks on the DHCP protocol: DHCP starvation, DHCP spoofing, and protection against these techniques
Security

Attacks on the DHCP protocol: DHCP starvation, DHCP spoofing, and…

26.03.202308/04/2025Alexander Mikhailov2760
Chances are high that you had dealt with DHCP when configuring a router. But are you aware of risks arising if this protocol is misconfigured on a company’s server? Using its misconfigurations, not only can a hacker disable the DHCP server, but also deliver…
CONTINUE READING 🡒
Poisonous spuds. Privilege escalation in AD with RemotePotato0
Security

Poisonous spuds. Privilege escalation in AD with RemotePotato0

26.03.202308/04/2025snovvcrash3340
This article discusses different variations of the NTLM Relay cross-protocol attack delivered using the RemotePotato0 exploit. In addition, you will learn how to hide the signature of an executable file from static analysis.
CONTINUE READING 🡒
Infiltration and exfiltration. Data transmission techniques used in pentesting
Security

Infiltration and exfiltration. Data transmission techniques used in pentesting

03.03.202308/04/2025s0i372770
Imagine a situation: you managed to penetrate the network perimeter and gained access to a server. This server is part of the company’s internal network, and, in theory, you could penetrate there as well. Too bad, the compromised node is in the DMZ and doesn’t have access to the Internet.…
CONTINUE READING 🡒
Nightmare Spoofing. Evil Twin attack over dynamic routing
Security

Nightmare Spoofing. Evil Twin attack over dynamic routing

03.03.202308/04/2025Caster3480
Attacks on dynamic routing domains can wreak havoc on the network since they disrupt the routing process. In this article, I am going to present my own modification of the Evil Twin attack designed to intercept data in OSPF-based networks. I will also demonstrate how…
CONTINUE READING 🡒
  • No bullshit
  • Cookie Policy
  • Privacy Policy
HackMag — Top-notch cybersecurity magazine © 2025
Support:support@hackmag.com