• News
  • Mobile
  • Security
  • Malware
  • Coding
  • Unix
  • DevOps
  • Log In
  • Sign Up
  • No bullshit
  • Cookie Policy
  • Privacy Policy
Log In / Sign Up

Category: Security

Caster Remix. Windows post-exploitation with virtual MikroTik
Security

Caster Remix. Windows post-exploitation with virtual MikroTik

21.03.202508/04/2025Caster350
Recently I discovered a new way to implement L2 tunneling against Windows networks. Inspired by the spying penguin concept, I am going to demonstrate a fresh approach to Windows post-exploitation involving a MikroTik Cloud Hosted Router (CHR) that enables you to perform pivoting and provides L2…
CONTINUE READING 🡒
JavaScript al dente. Fuzzing JS engines with Fuzzilli
Security

JavaScript al dente. Fuzzing JS engines with Fuzzilli

14.03.202508/04/2025sploitem2860
Hey guys! Today, pasta is on the menu! You will learn how to identify vulnerabilities in JavaScript engines using the Fuzzilli fuzzer. After a brief theoretical introduction, you’ll jump directly to practice. Let’s assemble the required tools and start fuzzing.
CONTINUE READING 🡒
PACS from a hacker’s perspective. Attacks on RFID-based physical access control systems
Security

PACS from a hacker’s perspective. Attacks on RFID-based physical access…

11.03.202508/04/2025Thund3rb0lt660
Hacking electronic turnstiles installed at building entrances is a popular trick shown in many movies. This article discusses RFID-based physical access control systems (PACS) and demonstrates how easily the most commonly used identifier, EM4100, can be faked.
CONTINUE READING 🡒
Gain sight of a remote network! Reconstructing the connection diagram based on traffic dump
Security

Gain sight of a remote network! Reconstructing the connection diagram…

04.03.202508/04/2025Alexander Mikhailov420
To comprehend operating principles and functions of network protocols, you have to understand their structure. The purpose of this study was to analyze a small portion of network traffic and reconstruct the network diagram based on the data extracted from it.
CONTINUE READING 🡒
Virtual magic. Emulation and virtualization technologies in pivoting
Security

Virtual magic. Emulation and virtualization technologies in pivoting

28.02.202508/04/2025s0i37410
When you conduct pentesting audits, you rarely enjoy such luxury as admin privileges or root rights. Quite the opposite, in most situations you have to deal with antiviruses and firewalls that make it almost impossible to deliver an attack. Fortunately, emulation and virtualization magic comes…
CONTINUE READING 🡒
Blinding Sysmon: How to disable Windows monitoring in a covert way
Security

Blinding Sysmon: How to disable Windows monitoring in a covert…

27.02.202508/04/2025driverenok421
Immediately after getting access to the target system, the attacker tries to blind its audit tools to remain undetected as long as possible. In this article, I will explain how to blind Sysmon in a covert way making it possible to fool the regular Windows audit.…
CONTINUE READING 🡒
Liquid Chrome. ‘Use After Free’ bug in the Blink engine
Security

Liquid Chrome. ‘Use After Free’ bug in the Blink engine

19.02.202508/04/2025sploitem400
In January 2021, Google released a new version of its Chrome browser. In total, 16 vulnerabilities have been fixed in it. Using one of them as an example, let’s find out how such bugs occur and examine their exploitation techniques enabling hackers to attack computers…
CONTINUE READING 🡒
Penguin’s secretes: Evidence collection in Linux
Security

Penguin’s secretes: Evidence collection in Linux

06.02.202508/04/2025Boris Razor & Alex Mess520
Hey, bro, are you aware that Windows is dead? Everyone is switching to free software nowadays. You’re a hacker security guy, right? So, your job is to ensure security. And here’s an interesting case to be investigated: a Linux computer and an incident that occurred with it.…
CONTINUE READING 🡒
Your guide to NTLM relay, Part 2: Delivering relay attacks
Security

Your guide to NTLM relay, Part 2: Delivering relay attacks

27.01.202508/04/2025DrieVlad1080
NTLM relay attacks aren’t new to pentesters. In most cases, the main prerequisite for a successful relay attack isn’t a vulnerability, but an infrastructure misconfiguration; this is why such attacks are often used in real-life situations. This article discusses relay attacks and techniques used to deliver them…
CONTINUE READING 🡒
Your guide to NTLM relay: Hijacking NTLM authentication to deliver a relay attack
Security

Your guide to NTLM relay: Hijacking NTLM authentication to deliver…

24.01.202508/04/2025DrieVlad1270
Why NTLM authentication is still present in many infrastructures? The correct answer is: because Windows cannot exist without it. But NTLM authentication is marred by a number of problems that can be exploited by attackers. One of such problems is its vulnerability to relay attacks. This article…
CONTINUE READING 🡒
Flaying three-headed sheep. How to dump Kerberos tickets in C++
Security

Flaying three-headed sheep. How to dump Kerberos tickets in C++

21.01.202508/04/2025MichelleVermishelle390
Kerberos offers plenty of user authentication features. Its main ‘bricks’ are tickets; in the course of penetration testing, the attacker dumps such tickets from the LSASS process memory at least once. Today, I will explain how this operation can be performed without sophisticated hacker…
CONTINUE READING 🡒
Goodbye Mimikatz! Inject tickets with your own hands
Security

Goodbye Mimikatz! Inject tickets with your own hands

16.01.202508/04/2025MichelleVermishelle360
To implement a number of pass-the-ticket attacks, you have to inject a Kerberos ticket into the compromised system. Such tools as Mimikatz, Impacket, or Rubeus can be used for this purpose, but they are easily detected by antiviruses, thus, making this approach ineffective. In this…
CONTINUE READING 🡒
Privileger: Now you’re in control of privileges in Windows
Security

Privileger: Now you’re in control of privileges in Windows

16.01.202508/04/2025MichelleVermishelle380
In Windows, privileges play a key role: only the admin has the authority to grant special rights to users so that they can perform their tasks. This article discusses a software tool called Privileger: it enables you to search the system for accounts with certain…
CONTINUE READING 🡒
Insecurity provider. How Windows leaks user passwords
Security

Insecurity provider. How Windows leaks user passwords

16.01.202508/04/2025MichelleVermishelle480
In Windows, most security mechanisms are based on user account passwords. Today, you will learn several techniques making it possible to intercept a password at the time of user authentication and write code that automates this process.
CONTINUE READING 🡒
Malformed ELFs. How to make executable Linux files debug-resistant
Security

Malformed ELFs. How to make executable Linux files debug-resistant

29.12.202408/04/2025kclo3490
Plenty of anti-debugging techniques are available nowadays, but one of them stands distinctive. Its main principle is not to detect a debugger, but to prevent the app from running in it. This article explains how such a goal can be achieved using parser differentials and fuzzing. You will…
CONTINUE READING 🡒
YARA to the maximum. Learn to write effective YARA rules by examples
Security

YARA to the maximum. Learn to write effective YARA rules…

21.12.202408/04/2025Nikolai Potolenskii580
Sometimes, YARA is called the Swiss Army knife of virus analysts. This tool makes it possible to create a set of rules to detect malicious and potentially dangerous programs quickly and accurately. In this article, I will explain how to write perfect YARA rules so that its engine…
CONTINUE READING 🡒
KARMAgeddon. Attacking client devices with Karma
Security

KARMAgeddon. Attacking client devices with Karma

21.12.202408/04/2025s0i37420
Even if your client device isn’t connected to Wi-Fi, it still can be attacked. There is a special category of attacks called Karma that compromise client devices equipped with Wi-Fi modules. This article explains in simple terms how such attacks work.
CONTINUE READING 🡒
Brute-force on-the-fly. Attacking wireless networks in a simple and effective way
Security

Brute-force on-the-fly. Attacking wireless networks in a simple and effective…

21.12.202408/04/2025s0i37380
Attacks on Wi-Fi are extremely diverse: your targets are both client devices and access points who, in turn, can use various protocols and authentication methods. This article presents a simple but effective brute-forcing technique for wireless networks.
CONTINUE READING 🡒
Megadrone. Assembling a long-range and jammer-resistant hacker drone
Security

Megadrone. Assembling a long-range and jammer-resistant hacker drone

31.08.202308/04/2025s0i37420
Imagine that you are sitting with your computer on an upper floor of a secure building located in the middle of a restricted zone fenced by electrified barbed wire. You feel completely safe: cameras and vigilant security personnel protect you. As of a…
CONTINUE READING 🡒
Diving Deep into Cybersecurity: Unlocking Advanced Tech Discussions for the Inquisitive Minds
Security

Diving Deep into Cybersecurity: Unlocking Advanced Tech Discussions for the…

22.08.202329/12/2024Sania Saleem490
This is an external third-party advertising publication.
CONTINUE READING 🡒
« Previous 1 2 3 4 5 6 7 8 9 10 … 13 14 15 Next »
  • No bullshit
  • Cookie Policy
  • Privacy Policy
HackMag — Top-notch cybersecurity magazine © 2025
Support:support@hackmag.com