• News
  • Mobile
  • Security
  • Malware
  • Coding
  • Unix
  • DevOps
  • Log In
  • Sign Up
  • No bullshit
  • Cookie Policy
  • Privacy Policy
Log In / Sign Up

Author: Ivan Piskunov

Malware Reverse Engineering for Beginners: Unpacking Packers and Defeating Protectors
Malware

Malware Reverse Engineering for Beginners: Unpacking Packers and Defeating Protectors

7 days ago16/09/2025Ivan Piskunov3980
One of malware authors’ favorite tricks is to use executable packers and protectors. Originally, these tools were fairly mundane: they were meant to shrink compiled binaries or produce demo builds without adding protection to the main code.…
CONTINUE READING 🡒
Linux Hardening: Essential Tools for Comprehensive Security Auditing
Unix

Linux Hardening: Essential Tools for Comprehensive Security Auditing

3 weeks ago13/09/2025Ivan Piskunov2240
In this article, we’ll explore the key utilities for Linux hardening—tools for assessing a Linux system’s security posture and validating configurations from an information security perspective. We’ll not only review the tools but also provide practical examples…
CONTINUE READING 🡒
Life Without Antivirus: How to Remove Malware Manually and Harden Your System for the Future
Malware

Life Without Antivirus: How to Remove Malware Manually and Harden…

2 months ago23/08/2025Ivan Piskunov1190
When asked “What antivirus do you use on your Windows machine?” many security professionals (including people on our editorial team) answer: none. When massive outbreaks infect hundreds of thousands of computers despite all the latest defense tech,…
CONTINUE READING 🡒
Conducting Forensics on Linux: Memory, Disk, and Network Dumping for Evidence Collection
Unix

Conducting Forensics on Linux: Memory, Disk, and Network Dumping for…

3 months ago22/07/2025Ivan Piskunov1880
The first task in digital forensics is data collection, specifically acquiring images of hard drives and RAM, as well as network connection dumps if they might be helpful. In this article, we'll explore what needs to be…
CONTINUE READING 🡒
Over-the-air tricks. Simple and effective Wi-Fi pentesting techniques
Security

Over-the-air tricks. Simple and effective Wi-Fi pentesting techniques

04.08.202008/04/2025Ivan Piskunov2690
In this article, I will demonstrate a few simple and common -although efficient! - Wi-Fi pentesting tricks: hiding your MAC address when you scan a network and attack WPA2, identification of 'hidden' networks, bypassing MAC filtering, and…
CONTINUE READING 🡒
Secrets of the treasurer’s laptop: digital forensic analysis helps solve cybercrime
Security

Secrets of the treasurer’s laptop: digital forensic analysis helps solve…

04.05.2020Ivan Piskunov4130
"Where's the money?" Or, rather, "Where did the money go?" The user of a company-owned Windows 10 laptop fell victim of a cyberfraud attack. Or maybe the employee faked it and stole the money while pointing fingers…
CONTINUE READING 🡒
Poisoned documents. How to exploit dangerous Microsoft Office bugs
Security

Poisoned documents. How to exploit dangerous Microsoft Office bugs

15.03.2020Ivan Piskunov5450
This article addresses several critical vulnerabilities in Microsoft Office programs. They aren't new and had caused a great stir a while back. Metasploit Framework modules have already been developed for these bugs, and plenty of related projects…
CONTINUE READING 🡒
Linux post-exploitation. Advancing from user to super-user in a few clicks
Security

Linux post-exploitation. Advancing from user to super-user in a few…

22.01.202007/03/2020Ivan Piskunov4390
This article is dedicated to some of the most popular and, more importantly, working post-exploitation utilities for Linux servers. You are about to learn how to manipulate the system, gain root access, or steal valuable data right…
CONTINUE READING 🡒
  • No bullshit
  • Cookie Policy
  • Privacy Policy
HackMag — Top-notch cybersecurity magazine © 2025
Support:support@hackmag.com