Virtual magic. Emulation and virtualization technologies in pivoting

Date: 28/02/2025

When you conduct pentesting audits, you rarely enjoy such luxury as admin privileges or root rights. Quite the opposite, in most situations you have to deal with antiviruses and firewalls that make it almost impossible to deliver an attack. Fortunately, emulation and virtualization magic comes to help, and, using these technologies, you can literally accomplish wonders!
Read full article →

Megadrone. Assembling a long-range and jammer-resistant hacker drone

Date: 31/08/2023

Imagine that you are sitting with your computer on an upper floor of a secure building located in the middle of a restricted zone fenced by electrified barbed wire. You feel completely safe: cameras and vigilant security personnel protect you. As of a sudden, you hear suspicious buzzing outside the window, and this sound distracts you for a few seconds. And in these few seconds, a backdoor is installed on your computer, and a hacker located 20 km from you penetrates the corporate network. Sounds fantastic? No way!
Read full article →

Poisonous fruit. How to assemble your own Wi-Fi Pineapple and put it to use

Date: 15/08/2023

In sci-fi movies, hackers often use small pocket devices, less than a cellphone in size, to hack a company’s wireless network, gain access to its servers, and steal passwords. This article gives you a chance to become one of such hackers; all you need for this is a fantastic gadget called Pineapple. Most importantly, you can assemble it yourself, and I will explain in detail how.
Read full article →