Skip to content

Hacking Articles

Raj Chandel's Blog

  • Courses We Offer
  • CTF Challenges
  • Penetration Testing
  • Web Penetration Testing
  • Red Teaming
  • Donate us
Red Teaming

A Detailed Guide on Rubeus

May 11, 2022 by raj19 Min Reading

Rubeus is a C# toolkit for Kerberos interaction and abuse. Kerberos, as we all know, is a ticket-based network authentication protocol used in Active Directories.

Defense Evasion, Red Teaming

Process Herpaderping (Mitre:T1055)

April 24, 2022 by raj5 Min Reading

Johnny Shaw demonstrated a defense evasion technique known as process herpaderping in which an attacker is able to inject malicious code into the mapped memory

Password Cracking

A Detailed Guide on Hydra

April 22, 2022 by raj13 Min Reading

Hello! Pentesters, this article is about a brute-forcing tool Hydra. Hydra is one of the favourite tools of security researchers and consultants. Being an excellent

Red Teaming

A Detailed Guide on HTML Smuggling

April 19, 2022 by raj9 Min Reading

HTML Smuggling is an evasive payload delivery method that helps an attacker smuggle payload past content filters and firewalls by hiding malicious payloads inside of

Password Cracking

A Detailed Guide on Medusa

April 15, 2022 by raj9 Min Reading

Hi Pentesters! Let’s learn about a different tool Medusa, which is intended to be a speedy, parallel and modular, login brute forcer. The goal of

Defense Evasion, Red Teaming

Process Doppelganging (Mitre:T1055.013)

April 14, 2022 by raj7 Min Reading

Eugene Kogan and Tal Liberman presented a technique for defense evasion called “Process Doppelganging” in Blackhat EU 2017 which can be found here and a

Defense Evasion, Red Teaming

Process Hollowing (Mitre:T1055.012)

April 12, 2022 by raj10 Min Reading

In July 2011, John Leitch of autosectools.com talked about a technique he called process hollowing in his whitepaper here. Ever since then, many malware campaigns

Red Teaming

A Detailed Guide on AMSI Bypass

April 11, 2022 by raj10 Min Reading

Windows developed the Antimalware Scan Interface (AMSI) standard that allows a developer to integrate malware defense in his application. AMSI allows an application to interact

Penetration Testing

A Detailed Guide on Responder (LLMNR Poisoning)

April 9, 2022 by raj15 Min Reading

Responder is a widely used tool in penetration testing scenarios, and red teamers often use it for lateral movement across the network. Additionally, Responder offers

Posts pagination

Previous 1 … 12 13 14 … 155 Next

Categories

© All Rights Reserved 2021 Theme: Prefer by Template Sell.