Apostroph: Pivoting on Linux with ZeroTier Pivoting is a specific phenomenon in which an attacker expands his presence in the network. In my article, I will demonstrate a method of moving around the network using ZeroTier.
Graveyard: Pivoting against Windows with Hamachi Pivoting is basically a fairly specific thing. The attacker needs to expand his network presence using various methods and tools. However, in my article I will demonstrate a experimental method of pivoting against Windows using Hamachi.
Witchhammer: Windows post-exploitation using virtual VPN channels Pivoting against Windows is a fairly complex post-exploitation process. In this article I will demonstrate my new method of link layer pivoting using SoftEther and without a virtual machine
Beyond the Code: Art of AppSec in Java. Exposing in Disguise. In the previous part, we discussed basic threats in AppSec and concluded that many times more enhanced approaches should be applied for mitigation. Just like in the previous article, in this one we will follow the principle of “explaining complex practices in simple words.” My goal is not to fill
Windows Nightmare: Extreme Pivoting against Windows This is a research about a specific vector of Windows post-exploitation using OpenWRT
Beyond the Code: Art of AppSec in Java Java is one of the most popular programming languages that leads in the development of Web Apps and when we talk about making software, keeping things safe is super important. It is a really big deal in the business world and it comes with its own set of tricky spots.