Skip to content

Hacking Articles

Raj Chandel's Blog

  • Courses We Offer
  • CTF Challenges
  • Penetration Testing
  • Web Penetration Testing
  • Red Teaming
  • Donate us
CTF Challenges, VulnHub

Chronos Vulnhub Walkthrough

December 11, 2021 by raj6 Min Reading

Chronos is an easy/medium machine from Vulnhub by AL1ENUM. This machine is also tested in VirtualBox. This lab is suitable for novices because it has

CTF Challenges, HackTheBox

Explore Hackthebox Walkthrough

December 7, 2021 by raj3 Min Reading

“Explore” is a Capture the Flag challenge that we’ll be solving today. (HTB) Hack the Box is where you can get your hands on one,

Penetration Testing

PowerShell for Pentester: Windows Reverse Shell

December 3, 2021 by raj7 Min Reading

Today, we’ll explore how to acquire a reverse shell using Powershell scripts on the Windows platform. Table of Content Powercat Invoke-PowerShellTcp (Nishang) ConPtyShell Mini-reverse PowerShell

Penetration Testing

Msfvenom Cheatsheet: Windows Exploitation

November 16, 2021 by raj7 Min Reading

In this post, you will learn how to use MsfVenom to generate all types of payloads for exploiting the windows platform. Read beginner guide from

Privilege Escalation

Windows Privilege Escalation: HiveNightmare

November 13, 2021 by raj6 Min Reading

CVE-2021-36934 also known as SeriousSAM and HiveNightmare vulnerability was discovered by Jonas Lykkegaard in July 2021. Due to an ACL misconfiguration in Windows 10 post-build

Penetration Testing

Powercat for Pentester

October 31, 2021 by raj9 Min Reading

Powercat is a simple network utility designed to perform low-level network communication operations. It implements the well-known Netcat functionality in Powershell. Interestingly, traditional anti-virus solutions

Privilege Escalation

Windows Privilege Escalation: Logon Autostart Execution (Registry Run Keys)

October 28, 2021 by raj4 Min Reading

If an attacker finds a service that has all permission and its bind with the Registry run key then he can perform privilege escalation or

Privilege Escalation

Windows Privilege Escalation: Boot Logon Autostart Execution (Startup Folder)

October 26, 2021 by raj4 Min Reading

The Windows Startup folder may be targeted by an attacker to escalate privileges or perform persistence attacks. By adding an application to a startup folder

Privilege Escalation

Windows Privilege Escalation: Stored Credentials (Runas)

October 20, 2021 by raj3 Min Reading

Stored Credentials Exploitation is a technique attackers use to increase privileges in Microsoft Windows. Therefore, it allows attackers to escalate their access by exploiting weaknesses

Posts pagination

Previous 1 … 18 19 20 … 155 Next

Categories

Join Our Training Program

Join Our Telegram Channel

Join Our Discord Channel

Cyber Security Mindmap

Follow us on Twitter

Follow us on Linkedin

© All Rights Reserved 2021 Theme: Prefer by Template Sell.