• News
  • Mobile
  • Security
  • Malware
  • Coding
  • Unix
  • DevOps
  • Log In
  • Sign Up
  • No bullshit
  • Cookie Policy
  • Privacy Policy
Log In / Sign Up

Category: Security

Security

DIY Audio: How to Build Your Own Digital-to-Analog Converter (DAC)

1 month ago10/08/2025Mak2k260
This article will help you build your first—or maybe not your first?—digital-to-analog converter (DAC). You’ll have several designs to choose from, ranging from classic to pretty radical. Pick whatever suits you. There are even a couple of…
CONTINUE READING 🡒
Security

Unlocking the Secret Features of DuckDuckGo: Unique Tools You Won’t…

1 month ago06/08/2025Eugene ZobninX0
If people are familiar with the search engine DuckDuckGo, it's primarily due to its enhanced privacy features. Unlike Google or Yandex, it doesn't collect user data, but its search results aren't as strong. However, if you dig…
CONTINUE READING 🡒
Security

Conducting a Wi-Fi Security Audit Using a Smartphone with Kali…

1 month ago06/08/202584ckf1r350
Wardriving can be effectively conducted using a smartphone, but the built-in radio module and Android apps are often insufficient for advanced attacks. Instead, external Wi-Fi adapters and console programs for Linux are typically used. All the necessary…
CONTINUE READING 🡒
Security

Earn Cryptocurrency by Renting Out Your Hard Drive Space

1 month ago06/08/202584ckf1r310
If you have unlimited internet and plenty of free disk space, you might be able to make some money from it. We'll explain how blockchain is used for data storage and conduct an experiment with the Storj…
CONTINUE READING 🡒
Security

Geek’s Desktop: No Icons, Drag-and-Drop, or Floating Windows

1 month ago06/08/2025Eugene ZobninX0
Have you ever wondered what kind of desktop die-hard Linux enthusiasts use, those who spend most of their time in the terminal? You know, the ones who write a shell script for every little task and look…
CONTINUE READING 🡒
Security

Understanding File Inclusion and Path Traversal: Two Fundamental Web Vulnerabilities

1 month ago06/08/2025Huseyn (az_AZ) Gadashov30
File Inclusion and Path Traversal vulnerabilities are among the most critical issues in web security, as they allow attackers to read and execute files. In this article, we will start by examining how these vulnerabilities work and…
CONTINUE READING 🡒
Security

Common Attack Scenarios on Corporate Networks: Analyzing Hacker Strategies

1 month ago03/08/2025Evgeny Gnedin30
Pentesters at Positive Technologies conduct dozens of penetration tests every year. This article is a collection of typical attack scenarios used during these pentests that allowed them to gain control over the client's network in 80% of…
CONTINUE READING 🡒
Security

Building a Pwnagotchi: Creating an AI-Powered Hacking Device

1 month ago02/08/2025ShəLMā10
Readers of "Хакер" have likely wondered at least once: is it possible to build an inexpensive device that can hack something with the push of a button? Or even without a button, on its own, automatically? Yes,…
CONTINUE READING 🡒
Security

Building a Hacker’s Toolkit: Essential Utilities for Easier Cybersecurity Operations

1 month ago02/08/2025Polski Kot10
Not sure what to do during the holidays? Not basking in the sun while gardening? Not belting out songs in a tipsy haze? No problem! Let me tell you about some fantastic programs that will surely entertain…
CONTINUE READING 🡒
Mobile Security

Self-defense for hackers. Monitoring attacks on the airwaves

1 month ago29/07/2025s0i3740
This article explains how to detect intrusions into your wireless network. Almost all mainstream attacks on Wi-Fi have distinctive features, and you can identify them by listening to the airwaves.
CONTINUE READING 🡒
Security

Gathering User Data in Windows Networks: Exploring Active Directory Without…

2 months ago27/07/2025RalfHackerX0
Imagine someone launching an attack on a corporate Windows network. Initially, the attacker has either limited or no privileges within the domain. Consequently, they will search for accounts and services without elevated privileges, meaning they won't be…
CONTINUE READING 🡒
Security

Collecting Credentials in Active Directory: Identifying Critical Data Amid Domain…

2 months ago27/07/2025RalfHackerX0
For a successful attack on Active Directory, taking control of workstations, and moving laterally across a network, a skilled hacker doesn't necessarily need user credentials. However, there are times when they are indispensable. To obtain these credentials,…
CONTINUE READING 🡒
Security

How to Fix a USB Drive That Has Turned Into…

2 months ago22/07/2025Aleksei Zemond Pankratov40
Imagine you insert a USB drive into your computer and see a message: "To use the disk in drive F:, you must first format it. Do you want to format it?" If it's a new USB drive,…
CONTINUE READING 🡒
Security

Choosing the Right Messenger for Secure and Private Communication

2 months ago22/07/2025Denis Kolesnichenko20
It's paradoxical but true: despite the variety of messaging apps available, we often don't really have a choice—we just use the ones our friends and acquaintances are using. But what if privacy is really important to you?…
CONTINUE READING 🡒
Security

Learning Game Hacking: Developing Cheats with a Simple Example

2 months ago22/07/20250x25CBFC4F20
Video games are great because the reward for success is genuinely satisfying, while the cost of failure is low. However, sometimes to unlock new abilities or simply to speed up gameplay, you might resort to not-so-honest methods.…
CONTINUE READING 🡒
Security

Analyzing Attacks on Microsoft Active Directory: Intrusion Techniques and Detection…

2 months ago22/07/2025Anton TyurinX0
Over the past four years, not a single Black Hat or DEF CON has gone by without presentations focusing on attacks against Microsoft Active Directory. Participants share new attack vectors and their own innovations, while also providing…
CONTINUE READING 🡒
Security

Mastering Kerberos: Capturing Active Directory on a HackTheBox Virtual Machine

2 months ago22/07/2025snovvcrash30
In this article, I will demonstrate how to progress from a beginner to a fully functional Active Directory domain controller administrator. We'll use a virtual machine available for hacking on the HackTheBox CTF platform as our guide.…
CONTINUE READING 🡒
Security

Introduction to Hacking: Authentication Testing and Basic Security Exploits

2 months ago20/07/2025Yury "Yurembo" Yazev20
Fifteen years ago, Chris Kaspersky's epic work "Fundamental Principles of Hacking" was the go-to guide for every budding computer security researcher. The editors of "Hacker" have taken on the challenge of updating this substantial work, bringing it…
CONTINUE READING 🡒
Security

Advanced OSINT Techniques: Exploring Modern Network Intelligence Methods

2 months ago20/07/2025soxoj40
What do competitive intelligence, penetration testing, and cyber incident investigations have in common? They all involve information gathering, primarily from open sources. But what do you do when the data you find isn't enough, and your usual…
CONTINUE READING 🡒
Security

Mastering the Terminal: Essential Tips to Become a Console Guru

2 months ago20/07/2025Eugene Zobnin20
Any Unix enthusiast who has spent a couple of hours learning basic commands and bash syntax knows that the command line is an incredibly handy tool. However, not everyone realizes just how powerful the console can actually…
CONTINUE READING 🡒
« Previous 1 2 3 4 5 6 … 11 12 13 Next »
  • No bullshit
  • Cookie Policy
  • Privacy Policy
HackMag — Top-notch cybersecurity magazine © 2025
Support:support@hackmag.com