A Postcard from Caster I
Sometimes life leaves you alone not to hurt you, but to show you how strong you can be.
Sometimes life leaves you alone not to hurt you, but to show you how strong you can be.
This is research on detecting attacks on Kerberos using traffic analysis.
A short demo of Noir, a tool that analyzes Juniper JunOS configurations for vulnerabilities, weak access controls, and misconfigurations.
Release of JunOS Security Inspector
IPv6 often remains active in corporate networks. In this article, I will discuss attacks on IPv6 and detection methods.
On September 1, I will publish an article on attacks on IPv6. Don't miss it!
Interactive IPv6 toolkit for pentesting IPv6 networks.
Research on detecting attacks on Active Directory based on network traffic analysis.
RouterOS Security Inspector performs configuration analysis for vulnerabilities and includes a CVE search function.
Pivoting is used in post-exploitation and has many methods, this article will talk about pivoting using Nebula.
Cisco equipment is widely used in production networks. This is a comprehensive article on how to protect Cisco IOS.
Kali Linux
A network security sniffer that allows network security audits based on traffic analysis.