• News
  • Mobile
  • Security
  • Malware
  • Coding
  • Unix
  • DevOps
  • Log In
  • Sign Up
  • No bullshit
  • Cookie Policy
  • Privacy Policy
Log In / Sign Up

Author: Caster

Kali Ashes: Hardening hacker distribution and mastering silent pentesting techniques
Security

Kali Ashes: Hardening hacker distribution and mastering silent pentesting techniques

05.05.202505/05/2025Caster40
Kali Linux is extremely popular among pentesters. However, if you penetrate into a network using default settings of this distribution, it would create much noise on the air, which won’t go unnoticed. This article discusses Kali hardening and explains how to make Linux as…
CONTINUE READING 🡒
Tunnels Nightmare: ISP protocols expand your pivoting capacity
Security

Tunnels Nightmare: ISP protocols expand your pivoting capacity

24.04.202524/04/2025Caster40
The modern TCP/IP protocol stack includes plenty of tunneling protocols. Normally, they are used to expand production networks and build infrastructure. But in this research, I will use them as pentesting tools.
CONTINUE READING 🡒
MikroTik Daymare. Protecting MikroTik equipment from hacker attacks
Security

MikroTik Daymare. Protecting MikroTik equipment from hacker attacks

18.04.202518/04/2025Caster20
MikroTik devices are widely used in corporate networks, but in most cases they aren’t properly configured, which opens the door to various attacks. This article discusses basic RouterOS security concepts, including protection against spoofing, traffic handling, and attacks on control panels.
CONTINUE READING 🡒
MikroTik Nightmare. Pentesting MikroTik network equipment
Security

MikroTik Nightmare. Pentesting MikroTik network equipment

09.04.202509/04/2025Caster70
This article discusses the security of MikroTik equipment from the attacker’s perspective. Being very popular, MikroTik products are often attacked by hackers. The primary focus of this research is post-exploitation. Also, I will touch on issues plaguing RouterOS defense mechanisms that are exploited by…
CONTINUE READING 🡒
Save me. How to protect networks against spoofing attacks
Security

Save me. How to protect networks against spoofing attacks

31.03.202508/04/2025Caster30
Spoofing attacks are simple to deliver, and their impact is gross. This article discusses such attacks from the security perspective. The main challenge is to intelligently integrate network security solutions with production without disrupting business processes. Such integration requires a good understanding of the network…
CONTINUE READING 🡒
Caster Remix. Windows post-exploitation with virtual MikroTik
Security

Caster Remix. Windows post-exploitation with virtual MikroTik

21.03.202508/04/2025Caster50
Recently I discovered a new way to implement L2 tunneling against Windows networks. Inspired by the spying penguin concept, I am going to demonstrate a fresh approach to Windows post-exploitation involving a MikroTik Cloud Hosted Router (CHR) that enables you to perform pivoting and provides L2…
CONTINUE READING 🡒
Nightmare Spoofing. Evil Twin attack over dynamic routing
Security

Nightmare Spoofing. Evil Twin attack over dynamic routing

03.03.202308/04/2025Caster150
Attacks on dynamic routing domains can wreak havoc on the network since they disrupt the routing process. In this article, I am going to present my own modification of the Evil Twin attack designed to intercept data in OSPF-based networks. I will also demonstrate how…
CONTINUE READING 🡒
Pivoting District: GRE Pivoting over network equipment
Security

Pivoting District: GRE Pivoting over network equipment

21.02.202308/04/2025Caster70
Too bad, security admins often don’t pay due attention to network equipment, which enables malefactors to hack such devices and gain control over them. What if attackers have already seized control over your peripherals? Will they be able to access the internal infrastructure?
CONTINUE READING 🡒
Ethernet Abyss. Network pentesting at the data link layer
Security

Ethernet Abyss. Network pentesting at the data link layer

13.02.202308/04/2025Caster110
When you attack a network at the data link layer, you can ‘leapfrog’ over all protection mechanisms set at higher levels. This article will walk you through most of the attack vectors targeting this lowest level of the network.
CONTINUE READING 🡒
Gateway Bleeding. Pentesting FHRP systems and hijacking network traffic
Security

Gateway Bleeding. Pentesting FHRP systems and hijacking network traffic

12.02.202308/04/2025Caster90
There are many ways to increase fault tolerance and reliability of corporate networks. Among other things, First Hop Redundancy Protocols (FHRP) are used for this purpose. In this article, I will explain how pentesters interact with FHRP in the course of network attacks.
CONTINUE READING 🡒
  • No bullshit
  • Cookie Policy
  • Privacy Policy
HackMag — Top-notch cybersecurity magazine © 2025
Support:support@hackmag.com