HackMag

  • Mobile
  • Security
  • Malware
  • Coding
  • Unix
  • Devops
  • HackMag

  • Mobile
  • Security
  • Malware
  • Coding
  • Unix
  • Devops
  • Sign Up
  • Log In
  • Subscriptions
  • Log Out

It’s a trap! How to create honeypots for stupid bots

Written by Hackat and Mikhail Artyukhin

If you had ever administered a server, you definitely know that the password-based authentication must be disabled or restricted: either by a whitelist, or a VPN gateway, or in some other way. We decided to conduct an experiment and check what happens if this simple step isn’t taken.
Read full article →

Battle Linux. Best pentesting and OSINT distributions

Written by Hackat and Mikhail Artyukhin

In this article, we will briefly discuss specialized Linux distributions used by pentesters and ethical hackers. The most popular such distribution is Kali, but we want to bring to your attention several other Linux systems – not only no less efficient, but even surpassing Kali in certain areas.
Read full article →

Protected by Qrator Labs
Recent Posts
  • Attacks on the DHCP protocol: DHCP starvation, DHCP spoofing, and protection against these techniques
  • Poisonous spuds. Privilege escalation in AD with RemotePotato0
  • Infiltration and exfiltration. Data transmission techniques used in pentesting
  • Nightmare Spoofing. Evil Twin attack over dynamic routing
  • Herpaderping and Ghosting. Two new ways to hide processes from antiviruses
Recent Comments
  • n01 on Spying penguin. Windows post-exploitation with a Linux-based VM
  • professional retard on Software for cracking software. Selecting tools for reverse engineering
  • Jim on Using Android to keep tabs on your girlfriend. With her consent, of course!
  • john on Homemade keylogger. Writing an undetectable keylogger in C#
  • Hosay on What data Windows 10 sends to Microsoft and how to stop it
What do you think about HackMag.com domain name?
  • Add your answer
  • Add your answer
×
You or your IP had already vote.
Recent Posts
  • Attacks on the DHCP protocol: DHCP starvation, DHCP spoofing, and protection against these techniques
  • Poisonous spuds. Privilege escalation in AD with RemotePotato0
  • Infiltration and exfiltration. Data transmission techniques used in pentesting
  • Nightmare Spoofing. Evil Twin attack over dynamic routing
  • Herpaderping and Ghosting. Two new ways to hide processes from antiviruses
Recent Comments
  • n01 on Spying penguin. Windows post-exploitation with a Linux-based VM
  • professional retard on Software for cracking software. Selecting tools for reverse engineering
  • Jim on Using Android to keep tabs on your girlfriend. With her consent, of course!
  • john on Homemade keylogger. Writing an undetectable keylogger in C#
  • Hosay on What data Windows 10 sends to Microsoft and how to stop it
  • Facebook

  • Twitter

  • Rss

HackMag.com © 2023

HackMag.com publishes high-quality translated content about information security, cyber security, hacking, malware and devops.