Axis Shift: Pivoting using ZeroTier Pivoting is a specific process in post-exploitation in which an attacker expands his presence in the network. This article is about pivoting using ZeroTier.
Nihilism: Access Layer Security Access level security is a sensitive issue, unauthorized connections to the local network can lead to insider attacks and serious damage to the infrastructure. In this article, I will demonstrate a few network security techniques at the access layer.
Stockholm Syndrome: Accurate network testing Caution is important when pentesting networks, it is important to perform the security analysis in a way that does not disrupt the customer's infrastructure. In this article, I will discuss the aspects that need to be considered for a safe security analysis.
Lyrica: Pentesting Cisco IOS Cisco hardware is distributed around the world and is often the target of attackers. In this article, I will demonstrate a Cisco IOS pentest
Funeral: Silent security analysis using traffic I think network traffic analysis in pentest scenarios is vastly underrated. In this article, I will demonstrate a technique to silently analyze the security of network equipment based on traffic analysis alone.
If You Hadn't: Detecting Active Directory Attacks with Suricata In this article, Caster will demonstrate the capabilities of Suricata signatures to detect attacks against Active Directory.
Kerbhammer: Detecting Kerberos attacks with Suricata Kerberos, while more secure than NTLM, also has some security nuances. In this article, researcher Caster will demonstrate techniques for detecting Kerberos attacks using Suricata.
Neurotransmitter: Detecting network attacks on Windows with Suricata Poisoning attacks against Windows machines have become well known among pentesters. In this article, I will demonstrate how to detect poisoning attacks using Suricata.
Disciple: A massive guide to securing Cisco IOS Cisco equipment is widespread in production networks. In this article, I will demonstrate methods to protect Cisco IOS from network attacks.
Lockdown: Ultimate RouterOS Security MikroTik equipment is widely distributed all over the world and its security is an acute issue. This article is intended for security engineers to improve the security level of your MikroTik equipment