In this article, I will demonstrate a few simple and common -although efficient! – Wi-Fi pentesting tricks: hiding your MAC address when you scan a network and attack WPA2, identification of ‘hidden’ networks, bypassing MAC filtering, and jamming access points.
Attacking Active Directory. An overview of actual privilege escalation techniques
Compromising a domain controller involves more than just finding a known vulnerability, stealing user credentials, or identifying an error in the security policy settings. The above ‘achievements’ grant only the minimum access level that may be insufficient for your goals. Therefore, to deliver a successful attack, you must escalate your system privileges in Active Directory. This article is dedicated to this intriguing process.
Lateral movement in Active Directory. Offensive techniques used to attack the domain
Imagine that you have successfully retrieved users’ accounts in a network with an Active Directory domain controller and escalated your privileges. But what if you control not the entire network, but just a small segment of it? You have to find out how to advance further through the network, escalate your privileges, and search for new entry points and relays.
Hacker’s toolbox 2020. Pentesting devices you should have at hand
HackMag selected fifteen devices enabling you to pentest everything: from mechanisms to contactless cards. This list does not include trivial tools, like screwdrivers and soldering irons, because everybody chooses them individually. Hopefully, this toolkit would be useful in your penetration testing endeavors.
Cyberdolphin. The story of Flipper — hacker’s Swiss Army knife
Hacking and pentesting are normally associated with hours-long sitting at your computer, but this is not quite so: many devices and wireless networks can be accessed only personally. In such situations, you need a hacking multitool – portable and suitable for ‘field work’. While some people are only dreaming about such a miraculous device, others are going to launch its mass production soon. The forthcoming tool is called Flipper.
Wi-Fi total PWN. Mastering actual Wi-Fi pentesting techniques from scratch
The best way to check the network’s security is by trying to hack it. In the past, HackMag had published materials about auditing Wi-Fi networks. Unfortunately, such guides quickly become obsolete. Today, I will share some practical and up-to-date experience in this area.
Bug hunt. Spying devices and how to detect them
One might think that bugs from spy movies got obsolete nowadays. Who needs this stuff if microphones and cameras are everywhere – in laptops, smartphones, and zillions of other devices? However, in most cases, it is more difficult to get access to these gadgets than to the physical space where they are located. Here is where miniature, barely visible, and top-notch equipment comes into play. Let’s try to find out whether ordinary people should be concerned about spying tools potentially used against them and what security precautions should be taken, if any.