• News
  • Mobile
  • Security
  • Malware
  • Coding
  • Unix
  • DevOps
  • Log In
  • Sign Up
  • No bullshit
  • Cookie Policy
  • Privacy Policy
Log In / Sign Up
Attacking Active Directory. An overview of actual privilege escalation techniques
Security

Attacking Active Directory. An overview of actual privilege escalation techniques

26.06.202008/04/2025RalfHacker3980
Compromising a domain controller involves more than just finding a known vulnerability, stealing user credentials, or identifying an error in the security policy settings. The above 'achievements' grant only the minimum access level that may be insufficient…
CONTINUE READING 🡒
Lateral movement in Active Directory. Offensive techniques used to attack the domain
Security

Lateral movement in Active Directory. Offensive techniques used to attack…

26.06.202008/04/2025RalfHacker5731
Imagine that you have successfully retrieved users' accounts in a network with an Active Directory domain controller and escalated your privileges. But what if you control not the entire network, but just a small segment of it?…
CONTINUE READING 🡒
Hacker’s toolbox 2020. Pentesting devices you should have at hand
Security

Hacker’s toolbox 2020. Pentesting devices you should have at hand

26.06.202008/04/2025Ilya Shaposhnikov6480
HackMag selected fifteen devices enabling you to pentest everything: from mechanisms to contactless cards. This list does not include trivial tools, like screwdrivers and soldering irons, because everybody chooses them individually. Hopefully, this toolkit would be useful…
CONTINUE READING 🡒
Cyberdolphin. The story of Flipper — hacker’s Swiss Army knife
Security

Cyberdolphin. The story of Flipper — hacker’s Swiss Army knife

26.06.202008/04/2025HackMag7153
Hacking and pentesting are normally associated with hours-long sitting at your computer, but this is not quite so: many devices and wireless networks can be accessed only personally. In such situations, you need a hacking multitool -…
CONTINUE READING 🡒
Wi-Fi total PWN. Mastering actual Wi-Fi pentesting techniques from scratch
Security

Wi-Fi total PWN. Mastering actual Wi-Fi pentesting techniques from scratch

04.05.202008/04/202584ckf1r35552
The best way to check the network's security is by trying to hack it. In the past, HackMag had published materials about auditing Wi-Fi networks. Unfortunately, such guides quickly become obsolete. Today, I will share some practical…
CONTINUE READING 🡒
Bug hunt. Spying devices and how to detect them
Security

Bug hunt. Spying devices and how to detect them

04.05.2020atreau5002
One might think that bugs from spy movies got obsolete nowadays. Who needs this stuff if microphones and cameras are everywhere - in laptops, smartphones, and zillions of other devices? However, in most cases, it is more…
CONTINUE READING 🡒
The beginning of Nginx. Igor Sysoev tells the story of the renowned web server
DevOps

The beginning of Nginx. Igor Sysoev tells the story of…

04.05.202004/05/2020HackMag5120
On December 12, 2019, a surprise search was conducted in the Moscow office of Nginx, Inc. Igor Ippolitov, an engineer at Nginx, was the first to inform the public of it in his Twitter. The original tweet…
CONTINUE READING 🡒
The great mischief. Working your way to the root flag through IPv6 labyrinths on a Hack the Box virtual machine
Security

The great mischief. Working your way to the root flag…

04.05.2020snovvcrash3180
In this article, I will explain how to gain superuser privileges on Mischief VM available on [Hack The Box](https://www.hackthebox.eu/) training grounds. During this journey, you will acquire some SNMP skills, understand the IPv6 routing principles, and learn…
CONTINUE READING 🡒
Secrets of the treasurer’s laptop: digital forensic analysis helps solve cybercrime
Security

Secrets of the treasurer’s laptop: digital forensic analysis helps solve…

04.05.2020Ivan Piskunov5230
"Where's the money?" Or, rather, "Where did the money go?" The user of a company-owned Windows 10 laptop fell victim of a cyberfraud attack. Or maybe the employee faked it and stole the money while pointing fingers…
CONTINUE READING 🡒
No tracking, no bookmarks. How to assemble your own cellphone
Mobile

No tracking, no bookmarks. How to assemble your own cellphone

04.05.2020Candidum3870
What does your phone know about you? How secure is your information, and who can access it? Do you know that you can build and flash your own, 100% secure cellphone in just a few days? Today,…
CONTINUE READING 🡒
Universal interception. How to bypass SSL Pinning and monitor traffic of any application
Security

Universal interception. How to bypass SSL Pinning and monitor traffic…

15.03.2020AseN4001
In many cases, the research of an app's internal structure can be narrowed down to monitoring its traffic. Just a few years ago, a major share of the traffic was transmitted via the plain, easily interceptable HTTP…
CONTINUE READING 🡒
Protecting microcontrollers. Implementing Firmware Hardening and Secure Boot on STM32
Security

Protecting microcontrollers. Implementing Firmware Hardening and Secure Boot on STM32

15.03.2020Alexander Buraga6480
The intensity of attacks targeting IoT devices increases with year over year. New threats require a complex approach; as a result, security became the top priority for both software developers and hardware manufacturers. This article addresses the…
CONTINUE READING 🡒
Where to study pentesting? An overview of training grounds for ethical hackers
Security

Where to study pentesting? An overview of training grounds for…

15.03.202015/03/2020snovvcrash8701
Today, I will give a brief overview of some of the best pentesting portals recognized by security experts. These training grounds enable ethical hackers to polish their skills while preserving 'ethicality' and exploit newly-discovered vulnerabilities while staying…
CONTINUE READING 🡒
Poisoned documents. How to exploit dangerous Microsoft Office bugs
Security

Poisoned documents. How to exploit dangerous Microsoft Office bugs

15.03.2020Ivan Piskunov6480
This article addresses several critical vulnerabilities in Microsoft Office programs. They aren't new and had caused a great stir a while back. Metasploit Framework modules have already been developed for these bugs, and plenty of related projects…
CONTINUE READING 🡒
Epic pivoting. Polishing traffic routing skills on HackTheBox virtual machines
Security

Epic pivoting. Polishing traffic routing skills on HackTheBox virtual machines

15.03.2020snovvcrash4000
A good knowledge of pivoting (a technique used to route traffic to the victim and back through interim hosts) is essential for any ethical hacker. Furthermore, this skill is absolutely mandatory for corporate network pentesting. In this…
CONTINUE READING 🡒
Hacked IP camera. Searching for vulnerabilities in smart gadgets
Security

Hacked IP camera. Searching for vulnerabilities in smart gadgets

28.02.202017/04/2025Ilya Shaposhnikov3470
The security of home gadgets is a burning topic. Botnet attacks such as [Mirai](https://en.wikipedia.org/wiki/Mirai_(malware)) affect millions of devices and inflict huge damages. Ethical hackers continue discovering vulnerabilities in popular gadgets, which manufacturers don't rush fixing. In this…
CONTINUE READING 🡒
Boost your Nmap! Empowering iconic network scanner with NSE scripts
DevOps

Boost your Nmap! Empowering iconic network scanner with NSE scripts

28.02.202017/04/2025Olga Barinova6030
Nmap is an iconic scanner broadly used by hackers, and many of them are wondering how to expand its capacity. In most cases, Nmap is used in combination with other software tools. In this article, I'll explain…
CONTINUE READING 🡒
The taming of Kerberos. Seizing control over Active Directory on a HackTheBox virtual PC
Security

The taming of Kerberos. Seizing control over Active Directory on…

28.02.202009/10/2025snovvcrash2180
In this article, I am going to show how to escalate from an unprivileged user to the administrator of the Active Directory domain controller. The demonstration will be performed on a virtual PC available for hacking on…
CONTINUE READING 🡒
A brief guide to programmable logic controllers. Searching for vulnerabilities in industrial PLC devices
Security

A brief guide to programmable logic controllers. Searching for vulnerabilities…

28.02.202017/04/2025Egor Litvinov4620
Many users believe that controllers installed in buildings and factories are protected better than home gadgets. They are wrong. Today, I will show you how to hack programmable logic controllers using a Linux-based computer. A Linx-150 automation…
CONTINUE READING 🡒
Hide-and-Seek with Windows 10. Testing spyware and privacy protection tools
Security

Hide-and-Seek with Windows 10. Testing spyware and privacy protection tools

28.02.202009/10/20258bit5992
Over four years have passed since the release of Windows 10, and throughout this entire period, user data have been 'leaking' to Microsoft servers. The problem has been further exacerbated by Microsoft repeatedly forcing a reset of…
CONTINUE READING 🡒
« Previous 1 2 3 … 40 41 42 43 44 45 46 47 48 49 Next »
  • No bullshit
  • Cookie Policy
  • Privacy Policy
HackMag — Top-notch cybersecurity magazine © 2025
Support:support@hackmag.com