MikroTik Nightmare. Pentesting MikroTik network equipment

Date: 09/04/2025

This article discusses the security of MikroTik equipment from the attacker’s perspective. Being very popular, MikroTik products are often attacked by hackers. The primary focus of this research is post-exploitation. Also, I will touch on issues plaguing RouterOS defense mechanisms that are exploited by malefactors.
Read full article →

Save me. How to protect networks against spoofing attacks

Date: 31/03/2025

Spoofing attacks are simple to deliver, and their impact is gross. This article discusses such attacks from the security perspective. The main challenge is to intelligently integrate network security solutions with production without disrupting business processes. Such integration requires a good understanding of the network and equipment specifics. In fact, this is the cornerstone of success.
Read full article →

Nightmare Spoofing. Evil Twin attack over dynamic routing

Date: 03/03/2023

Attacks on dynamic routing domains can wreak havoc on the network since they disrupt the routing process. In this article, I am going to present my own modification of the Evil Twin attack designed to intercept data in OSPF-based networks. I will also demonstrate how to connect to an offline system, bypass authentication, and perform a malicious LSU injection.
Read full article →