Evil Ethernet. BadUSB-ETH attack in detail

Date: 07/07/2023

If you have a chance to plug a specially crafted device to a USB port of the target computer, you can completely intercept its traffic, collect cookies and passwords, and hack the domain controller. The attack is delivered over Wi-Fi, and this article explains how to implement it.
Read full article →

VERY bad flash drive. BadUSB attack in detail

Date: 07/07/2023

BadUSB attacks are efficient and deadly. This article explains how to deliver such an attack, describes in detail the preparation of a malicious flash drive required for it, provides code that must be written on this device, and discusses how to make Windows and Linux users plug your ‘memory stick’ into their computers.
Read full article →

Cold boot attack. Dumping RAM with a USB flash drive

Date: 08/06/2023

Even if you take efforts to protect the safety of your data, don’t attach sheets with passwords to the monitor, encrypt your hard drive, and always lock your computer before leaving it unattended, this doesn’t guarantee that your information is safe. Your RAM can be easily dumped using a simple memory stick, and today I will explain in detail how to do this.
Read full article →

Kung fu enumeration. Data collection in attacked systems

Date: 19/04/2023

In penetration testing, there’s a world of difference between reconnaissance (recon) and data collection (enum). Recon involves passive actions; while enum, active ones. During recon, you use only open sources (OSINT), and the target system is not affected in any way (i.e. all actions are performed anonymously). By contrast, at the enumeration (data collection) stage, you interact with the target. This article discusses the data collection stage as an integral component of any pentesting study.
Read full article →