Articles
Legless: IPv6 Security
IPv6 often remains active in corporate networks. In this article, I will discuss attacks on IPv6 and detection methods.
Network Security Expert, 23 y.o, INTJ, 5w6
Articles
IPv6 often remains active in corporate networks. In this article, I will discuss attacks on IPv6 and detection methods.
Teasers
On September 1, I will publish an article on attacks on IPv6. Don't miss it!
Teasers
Tool
Interactive IPv6 toolkit for pentesting IPv6 networks.
Video
Research on detecting attacks on Active Directory based on network traffic analysis.
Kali Linux
RouterOS Security Inspector performs configuration analysis for vulnerabilities and includes a CVE search function.
Articles
Pivoting is used in post-exploitation and has many methods, this article will talk about pivoting using Nebula.
Articles
Cisco equipment is widely used in production networks. This is a comprehensive article on how to protect Cisco IOS.
Articles
Since MikroTik equipment is widely distributed all over the world, its security is a very pressing issue. This is a massive article on how to protect your MikroTik devices.
Kali Linux
A network security sniffer that allows network security audits based on traffic analysis.