How do hacking groups get a license anonymously for threat emulation software like Cobalt Strike?

I’ve seen that a lot of hacking groups replicate techniques and attacks from red teams using software like Cobalt Strike and Powershell frameworks for offensive security and red teaming like Nishang and don’t create custom ma… Continue reading How do hacking groups get a license anonymously for threat emulation software like Cobalt Strike?

Building a VPN for Mobile Devices at the Network Level

By David Balaban
In 2019, there is still surprisingly little information about such an old, simple, convenient, and secure technology, as mobile VPN – Virtual Private Network). In this article, I will describe how you can provide access to your v… Continue reading Building a VPN for Mobile Devices at the Network Level

Can a PC without VPN expose the public IP of another PC with VPN on the same local network?

Computer 1 is surfing the internet while using a VPN and at the same time accesses files on computer 2 (this computer does not have VPN) on the same local network. Since computer 2 does not have a VPN would it somehow reveal … Continue reading Can a PC without VPN expose the public IP of another PC with VPN on the same local network?

Is Flawless Anonymity Possible?

By David Balaban
The condition of being anonymous is called anonymity – Let’s suppose you want to post the most anonymous comment on a social network imaginable. What kind of an instrument do you need for that? VPN? Tor? SSH tunnel? In fact, none… Continue reading Is Flawless Anonymity Possible?