HackMag

  • News
  • Mobile
  • Security
  • Malware
  • Coding
  • Unix
  • DevOps
  • HackMag

  • News
  • Mobile
  • Security
  • Malware
  • Coding
  • Unix
  • DevOps

Pivoting District: GRE Pivoting over network equipment

Date: 21/02/2023

Author: Caster

Too bad, security admins often don’t pay due attention to network equipment, which enables malefactors to hack such devices and gain control over them. What if attackers have already seized control over your peripherals? Will they be able to access the internal infrastructure?
Read full article →

Ethernet Abyss. Network pentesting at the data link layer

Date: 13/02/2023

Author: Caster

When you attack a network at the data link layer, you can ‘leapfrog’ over all protection mechanisms set at higher levels. This article will walk you through most of the attack vectors targeting this lowest level of the network.
Read full article →

Gateway Bleeding. Pentesting FHRP systems and hijacking network traffic

Date: 12/02/2023

Author: Caster

There are many ways to increase fault tolerance and reliability of corporate networks. Among other things, First Hop Redundancy Protocols (FHRP) are used for this purpose. In this article, I will explain how pentesters interact with FHRP in the course of network attacks.
Read full article →

  • «
  • 1
  • 2

HackMag.com © 2025

Privacy Policy | Cookie Policy