• News
  • Mobile
  • Security
  • Malware
  • Coding
  • Unix
  • DevOps
  • Log In
  • Sign Up
  • No bullshit
  • Cookie Policy
  • Privacy Policy
Log In / Sign Up

Category: Security

Security

Victory over “bads”: using Victoria to recover data and reset…

04.06.202584ckf1r390
Recovering deleted files is not a problem; there are dozens of utilities for this. But what if the drive is damaged, has an erroneous geometry description, or is password protected at the controller level? Then the Victoria utility comes to the rescue. It is written in assembler, takes up…
CONTINUE READING 🡒
Security

We cover our tracks. How to make Windows forget everything

04.06.202504/06/2025Denis Kolesnichenko40
Lists of open files and USB devices, browser history, DNS cache – all this helps to find out what the user was doing. We have compiled step-by-step instructions on how to remove traces of your activity in different versions of Windows, Office and popular browsers. At the end…
CONTINUE READING 🡒
Security

A darknet trip. Take the greenest places .onion

04.06.202504/06/2025Nikita Zlichin70
The word “darknet” has almost become a cliché for everything that is taboo, difficult to access, and potentially dangerous. But what is a real darknet? We’re offering you another study sharing everything we’ve been able to dig up lately. This time – with…
CONTINUE READING 🡒
Security

Bring Your Own Vulnerable Driver! Meet BYOVD – one of…

27.05.2025Nik Zerof10
Many notorious hacker groups (e.g. North Korea’s Lazarus) use the BYOVD attack to gain access to kernel space and implement complex advanced persistent threats (APTs). The same technique is employed by the creators of the Terminator tool and various encryptor operators. This paper discusses BYOVD operating…
CONTINUE READING 🡒
Security

IP cameras in pentesting. Improper use of security cameras

21.05.2025DrieVlad40
In the course of a pentesting audit, you can capture an image from a security camera and attach it to your report – just to please the customer. No doubt, such pictures are impressive, but what can be the real impact of attacks targeting cameras? Today I will…
CONTINUE READING 🡒
Security

In the footsteps of Phrack. Searching for LKM rootkits in…

12.05.202512/05/2025kclo320
A long time ago, in the early days of my journey to Linux kernel rootkits, I came across a Phrack article describing a rootkit detection technique implemented for i386. The article wasn’t new and referred to a vintage Linux kernel dated 2003. Something in that paper…
CONTINUE READING 🡒
Security

Threadless Injection. Injecting shellcode into third-party processes to circumvent EDR

07.05.2025Nik Zerof20
This article discusses Threadless Injection: a technique making it possible to make injections into third-party processes. At the time of writing, it effectively worked on Windows 11 23H2 x64 running on a virtual machine isolated from the network with OS security features enabled.
CONTINUE READING 🡒
Security

Kali Ashes: Hardening hacker distribution and mastering silent pentesting techniques

05.05.202505/05/2025Caster10
Kali Linux is extremely popular among pentesters. However, if you penetrate into a network using default settings of this distribution, it would create much noise on the air, which won’t go unnoticed. This article discusses Kali hardening and explains how to make Linux as…
CONTINUE READING 🡒
Security

Process Ghosting. Circumvent antiviruses in the most dangerous way

28.04.2025Nik Zerof20
One of the main priorities for hackers is to hide the execution of their malicious code. This article explains how to start processes using the Process Ghosting technique and discusses operation principles of malware detection systems.
CONTINUE READING 🡒
Security

Tunnels Nightmare: ISP protocols expand your pivoting capacity

24.04.202524/04/2025CasterX0
The modern TCP/IP protocol stack includes plenty of tunneling protocols. Normally, they are used to expand production networks and build infrastructure. But in this research, I will use them as pentesting tools.
CONTINUE READING 🡒
Security

Evilginx + Gophish. Deploying phishing simulation infrastructure and bypassing 2FA

21.04.202521/04/2025Georgii Nadeliaev30
In the course of a pentesting audit, you often have to simulate phishing attacks. This article provides a step-by-step guide to deploying infrastructure for such simulation. You will learn how to create a mail server from scratch, install and configure the Evilginx reverse proxy, and then integrate…
CONTINUE READING 🡒
Security

MikroTik Daymare. Protecting MikroTik equipment from hacker attacks

18.04.202518/04/2025CasterX0
MikroTik devices are widely used in corporate networks, but in most cases they aren’t properly configured, which opens the door to various attacks. This article discusses basic RouterOS security concepts, including protection against spoofing, traffic handling, and attacks on control panels.
CONTINUE READING 🡒
Security

Blinding Sysmon completely: Manipulating ETW objects to evade monitoring

17.04.202517/04/2025driverenok20
Immediately after getting access to the target system, the attacker tries to disable its audit tools to remain undetected as long as possible. In this article, I will explain how to blind Windows monitoring tools by manipulating the Event Tracing for Windows (ETW) subsystem.
CONTINUE READING 🡒
Security

NFC from a hacker’s perspective. Attacking Mifare-based PACS

14.04.2025Thund3rb0lt20
At some point, simple identifiers cannot ensure proper access control anymore, and consumers switch to a more advanced solution: Mifare. But are Mifare-based devices actually as secure as the manufacturer claims? Let’s figure it out!
CONTINUE READING 🡒
Security

MikroTik Nightmare. Pentesting MikroTik network equipment

09.04.202509/04/2025Caster30
This article discusses the security of MikroTik equipment from the attacker’s perspective. Being very popular, MikroTik products are often attacked by hackers. The primary focus of this research is post-exploitation. Also, I will touch on issues plaguing RouterOS defense mechanisms that are exploited by…
CONTINUE READING 🡒
Security

Save me. How to protect networks against spoofing attacks

31.03.202508/04/2025CasterX0
Spoofing attacks are simple to deliver, and their impact is gross. This article discusses such attacks from the security perspective. The main challenge is to intelligently integrate network security solutions with production without disrupting business processes. Such integration requires a good understanding of the network…
CONTINUE READING 🡒
Security

Caster Remix. Windows post-exploitation with virtual MikroTik

21.03.202508/04/2025Caster20
Recently I discovered a new way to implement L2 tunneling against Windows networks. Inspired by the spying penguin concept, I am going to demonstrate a fresh approach to Windows post-exploitation involving a MikroTik Cloud Hosted Router (CHR) that enables you to perform pivoting and provides L2…
CONTINUE READING 🡒
Security

JavaScript al dente. Fuzzing JS engines with Fuzzilli

14.03.202508/04/2025sploitem80
Hey guys! Today, pasta is on the menu! You will learn how to identify vulnerabilities in JavaScript engines using the Fuzzilli fuzzer. After a brief theoretical introduction, you’ll jump directly to practice. Let’s assemble the required tools and start fuzzing.
CONTINUE READING 🡒
Security

PACS from a hacker’s perspective. Attacks on RFID-based physical access…

11.03.202508/04/2025Thund3rb0lt30
Hacking electronic turnstiles installed at building entrances is a popular trick shown in many movies. This article discusses RFID-based physical access control systems (PACS) and demonstrates how easily the most commonly used identifier, EM4100, can be faked.
CONTINUE READING 🡒
Security

Gain sight of a remote network! Reconstructing the connection diagram…

04.03.202508/04/2025Alexander Mikhailov40
To comprehend operating principles and functions of network protocols, you have to understand their structure. The purpose of this study was to analyze a small portion of network traffic and reconstruct the network diagram based on the data extracted from it.
CONTINUE READING 🡒
« Previous 1 2 3 4 5 6 7 8 … 11 12 13 Next »
  • No bullshit
  • Cookie Policy
  • Privacy Policy
HackMag — Top-notch cybersecurity magazine © 2025
Support:support@hackmag.com