Kerbhammer: Detecting Kerberos attacks with Suricata Kerberos, while more secure than NTLM, also has some security nuances. In this article, researcher Caster will demonstrate techniques for detecting Kerberos attacks using Suricata.
Neurotransmitter: Detecting network attacks on Windows with Suricata Poisoning attacks against Windows machines have become well known among pentesters. In this article, I will demonstrate how to detect poisoning attacks using Suricata.
Disciple: A massive guide to securing Cisco IOS Cisco equipment is widespread in production networks. In this article, I will demonstrate methods to protect Cisco IOS from network attacks.
Lockdown: Ultimate RouterOS Security MikroTik equipment is widely distributed all over the world and its security is an acute issue. This article is intended for security engineers to improve the security level of your MikroTik equipment
Oldschool Passenger: Network Pivoting with PeerVPN PeerVPN is an older solution for building VPNs, but even it can be used to pivot through an external compromised host
Strider: Network Pivoting with Nebula I have published an article on pivoting techniques using the Nebula tool. The article uses the concept of "Living off the Land" so that there is an attempt to avoid detection by defense systems
Renegade: Network Pivoting with SoftEther SoftEther finds various uses in production, but in this article I will demonstrate a way to network infrastructure deployment in a pentest scenario
Defect VIP: Pivoting on Linux with TailScale In this article, I will demonstrate a method of pivoting on Linux using TailScale to get into the internal infrastructure. One of the Living off the land techniques.
Defect: Pivoting on Windows with TailScale Pivoting is one of the stages of post-exploitation, in a sense it is extreme network administration. In my article I will demonstrate pivoting on Windows using TailScale
Witchhammer VIP: NAT bypass for pivoting on Windows NAT can cause problems for a pentester when pivoting, especially if we are talking about compromised Windows machines. In this article, I will continue to demonstrate the concept of L2 tunneling against compromised Windows machines, but with NAT in mind