• News
  • Mobile
  • Security
  • Malware
  • Coding
  • Unix
  • DevOps
  • Log In
  • Sign Up
  • No bullshit
  • Cookie Policy
  • Privacy Policy
Log In / Sign Up

Author: Alexander Mikhailov

Gain sight of a remote network! Reconstructing the connection diagram based on traffic dump
Security

Gain sight of a remote network! Reconstructing the connection diagram…

04.03.202508/04/2025Alexander Mikhailov330
To comprehend operating principles and functions of network protocols, you have to understand their structure. The purpose of this study was to analyze a small portion of network traffic and reconstruct the network diagram based on the data extracted from it.
CONTINUE READING 🡒
Attacks on the DHCP protocol: DHCP starvation, DHCP spoofing, and protection against these techniques
Security

Attacks on the DHCP protocol: DHCP starvation, DHCP spoofing, and…

26.03.202308/04/2025Alexander Mikhailov530
Chances are high that you had dealt with DHCP when configuring a router. But are you aware of risks arising if this protocol is misconfigured on a company’s server? Using its misconfigurations, not only can a hacker disable the DHCP server, but also deliver…
CONTINUE READING 🡒
  • No bullshit
  • Cookie Policy
  • Privacy Policy
HackMag — Top-notch cybersecurity magazine © 2025
Support:support@hackmag.com