This article will help you build your first—or maybe not your first?—digital-to-analog converter (DAC). You’ll have several designs to choose from, ranging from classic to pretty radical. Pick whatever suits you. There are even a couple of…
CONTINUE READING 🡒 Category: Security
Unlocking the Secret Features of DuckDuckGo: Unique Tools You Won’t…
If people are familiar with the search engine DuckDuckGo, it's primarily due to its enhanced privacy features. Unlike Google or Yandex, it doesn't collect user data, but its search results aren't as strong. However, if you dig…
CONTINUE READING 🡒 Conducting a Wi-Fi Security Audit Using a Smartphone with Kali…
Wardriving can be effectively conducted using a smartphone, but the built-in radio module and Android apps are often insufficient for advanced attacks. Instead, external Wi-Fi adapters and console programs for Linux are typically used. All the necessary…
CONTINUE READING 🡒 Earn Cryptocurrency by Renting Out Your Hard Drive Space
If you have unlimited internet and plenty of free disk space, you might be able to make some money from it. We'll explain how blockchain is used for data storage and conduct an experiment with the Storj…
CONTINUE READING 🡒 Geek’s Desktop: No Icons, Drag-and-Drop, or Floating Windows
Have you ever wondered what kind of desktop die-hard Linux enthusiasts use, those who spend most of their time in the terminal? You know, the ones who write a shell script for every little task and look…
CONTINUE READING 🡒 Understanding File Inclusion and Path Traversal: Two Fundamental Web Vulnerabilities
File Inclusion and Path Traversal vulnerabilities are among the most critical issues in web security, as they allow attackers to read and execute files. In this article, we will start by examining how these vulnerabilities work and…
CONTINUE READING 🡒 Common Attack Scenarios on Corporate Networks: Analyzing Hacker Strategies
Pentesters at Positive Technologies conduct dozens of penetration tests every year. This article is a collection of typical attack scenarios used during these pentests that allowed them to gain control over the client's network in 80% of…
CONTINUE READING 🡒 Building a Pwnagotchi: Creating an AI-Powered Hacking Device
Readers of "Хакер" have likely wondered at least once: is it possible to build an inexpensive device that can hack something with the push of a button? Or even without a button, on its own, automatically? Yes,…
CONTINUE READING 🡒 Building a Hacker’s Toolkit: Essential Utilities for Easier Cybersecurity Operations
Not sure what to do during the holidays? Not basking in the sun while gardening? Not belting out songs in a tipsy haze? No problem! Let me tell you about some fantastic programs that will surely entertain…
CONTINUE READING 🡒 Self-defense for hackers. Monitoring attacks on the airwaves
This article explains how to detect intrusions into your wireless network. Almost all mainstream attacks on Wi-Fi have distinctive features, and you can identify them by listening to the airwaves.
CONTINUE READING 🡒 Gathering User Data in Windows Networks: Exploring Active Directory Without…
Imagine someone launching an attack on a corporate Windows network. Initially, the attacker has either limited or no privileges within the domain. Consequently, they will search for accounts and services without elevated privileges, meaning they won't be…
CONTINUE READING 🡒 Collecting Credentials in Active Directory: Identifying Critical Data Amid Domain…
For a successful attack on Active Directory, taking control of workstations, and moving laterally across a network, a skilled hacker doesn't necessarily need user credentials. However, there are times when they are indispensable. To obtain these credentials,…
CONTINUE READING 🡒 How to Fix a USB Drive That Has Turned Into…
Imagine you insert a USB drive into your computer and see a message: "To use the disk in drive F:, you must first format it. Do you want to format it?" If it's a new USB drive,…
CONTINUE READING 🡒 Choosing the Right Messenger for Secure and Private Communication
It's paradoxical but true: despite the variety of messaging apps available, we often don't really have a choice—we just use the ones our friends and acquaintances are using. But what if privacy is really important to you?…
CONTINUE READING 🡒 Learning Game Hacking: Developing Cheats with a Simple Example
Video games are great because the reward for success is genuinely satisfying, while the cost of failure is low. However, sometimes to unlock new abilities or simply to speed up gameplay, you might resort to not-so-honest methods.…
CONTINUE READING 🡒 Analyzing Attacks on Microsoft Active Directory: Intrusion Techniques and Detection…
Over the past four years, not a single Black Hat or DEF CON has gone by without presentations focusing on attacks against Microsoft Active Directory. Participants share new attack vectors and their own innovations, while also providing…
CONTINUE READING 🡒 Mastering Kerberos: Capturing Active Directory on a HackTheBox Virtual Machine
In this article, I will demonstrate how to progress from a beginner to a fully functional Active Directory domain controller administrator. We'll use a virtual machine available for hacking on the HackTheBox CTF platform as our guide.…
CONTINUE READING 🡒 Introduction to Hacking: Authentication Testing and Basic Security Exploits
Fifteen years ago, Chris Kaspersky's epic work "Fundamental Principles of Hacking" was the go-to guide for every budding computer security researcher. The editors of "Hacker" have taken on the challenge of updating this substantial work, bringing it…
CONTINUE READING 🡒 Advanced OSINT Techniques: Exploring Modern Network Intelligence Methods
What do competitive intelligence, penetration testing, and cyber incident investigations have in common? They all involve information gathering, primarily from open sources. But what do you do when the data you find isn't enough, and your usual…
CONTINUE READING 🡒 Mastering the Terminal: Essential Tips to Become a Console Guru
Any Unix enthusiast who has spent a couple of hours learning basic commands and bash syntax knows that the command line is an incredibly handy tool. However, not everyone realizes just how powerful the console can actually…
CONTINUE READING 🡒