Übermensch: Bypassing NAT when pivoting on Windows with Nebula This article explores advanced NAT pivoting techniques on Windows using Nebula, leveraging Hole Punching and ICS to access internal network
Philosophy of Nietzsche: Pivoting on Windows using Nebula In this article, I will demonstrate an exotic method I found for pivoting on Windows by building an overlay Nebula network
Bipolar Disorder: Pivoting with TailScale Pivoting is used in a post-exploitation context and has many techniques. In this article I will also demonstrate the ability to move around the network using TailScale.
Against: Pentesting MikroTik Routers The use of MikroTik routers is widespread around the world and their security is an issue. This is a release of my article on attacks on MikroTik routers.
Violence: Pivoting using Nebula Pivoting is used in post-exploitation and has many methods, this article will talk about pivoting using Nebula
Axis Shift: Pivoting using ZeroTier Pivoting is a specific process in post-exploitation in which an attacker expands his presence in the network. This article is about pivoting using ZeroTier.
Nihilism: Access Layer Security Access level security is a sensitive issue, unauthorized connections to the local network can lead to insider attacks and serious damage to the infrastructure. In this article, I will demonstrate a few network security techniques at the access layer.
Stockholm Syndrome: Accurate network testing Caution is important when pentesting networks, it is important to perform the security analysis in a way that does not disrupt the customer's infrastructure. In this article, I will discuss the aspects that need to be considered for a safe security analysis.
Lyrica: Pentesting Cisco IOS Cisco hardware is distributed around the world and is often the target of attackers. In this article, I will demonstrate a Cisco IOS pentest
Funeral: Silent security analysis using traffic I think network traffic analysis in pentest scenarios is vastly underrated. In this article, I will demonstrate a technique to silently analyze the security of network equipment based on traffic analysis alone.