• News
  • Mobile
  • Security
  • Malware
  • Coding
  • Unix
  • DevOps
  • Log In
  • Sign Up
  • No bullshit
  • Cookie Policy
  • Privacy Policy
Log In / Sign Up

Author: s0i37

Lateral movement guide: Remote code execution in Windows
Security

Lateral movement guide: Remote code execution in Windows

30.12.202108/04/2025s0i37770
Penetration into the target network is just the first stage of a hacking attack. At the next stage, you have to establish a foothold there, steal users’ credentials, and gain the ability to run arbitrary code in the system. This article discusses techniques used to achieve the above goals and explains…
CONTINUE READING 🡒
Kung Fu pivoting. Post-exploitation to the maximum
Security

Kung Fu pivoting. Post-exploitation to the maximum

19.09.202108/04/2025s0i37580
Pivoting is an important stage of any pentesting research: the attacker establishes a foothold in the compromised system to use it as a bridgehead for further penetration. This article examines the basic pivoting techniques used nowadays.
CONTINUE READING 🡒
Spying penguin. Windows post-exploitation with a Linux-based VM
Security

Spying penguin. Windows post-exploitation with a Linux-based VM

29.05.2021s0i37391
Windows-based systems are significantly more resistant against MITM attacks in comparison with Linux-based ones. The reason is simple: Windows does not include a handy mechanism to forward transit packets. Today, I will explain how to use a minimalist Linux system running on a virtual machine…
CONTINUE READING 🡒
« Previous 1 2
  • No bullshit
  • Cookie Policy
  • Privacy Policy
HackMag — Top-notch cybersecurity magazine © 2025
Support:support@hackmag.com