Skip to content

Hacking Articles

Raj Chandel's Blog

  • Courses We Offer
  • CTF Challenges
  • Penetration Testing
  • Web Penetration Testing
  • Red Teaming
  • Donate us
Privilege Escalation

Windows Privilege Escalation: Weak Registry Permission

October 19, 2021 by raj6 Min Reading

Microsoft Windows offers a wide range of fine-grained permissions and privileges for controlling access to Windows components including services, files, and registry entries. Exploiting Weak

CTF Challenges, HackTheBox

TheNotebook HackTheBox Walkthrough

October 16, 2021 by raj6 Min Reading

We’ll look at another one of HackTheBox machines today, called “TheNotebook.” It is a medium difficulty box targeting the commonly found threat of using insecure

Privilege Escalation

Windows Privilege Escalation: Unquoted Service Path

October 14, 2021 by raj6 Min Reading

Microsoft Windows offers a wide range of fine-grained permissions and privileges for controlling access to Windows components including services, files, and registry entries. Exploiting Unquoted

Privilege Escalation

Windows Privilege Escalation: Insecure GUI Application

October 14, 2021 by raj3 Min Reading

In the series of Privilege escalation, till now we have learned that Microsoft Windows offers a wide range of fine-grained permissions and privileges for controlling

CTF Challenges, HackTheBox

Armageddon HackTheBox Walkthrough

October 12, 2021 by raj6 Min Reading

We’ll look at another one of HackTheBox machines today, called “Armageddon.” It is an easy box targeting the commonly found threat of using outdated plugins.

Privilege Escalation

Windows Privilege Escalation: Weak Services Permission

October 11, 2021 by raj6 Min Reading

Windows Privilege Escalation: Weak Services Permission is a critical topic in cybersecurity, especially when dealing with Microsoft Windows environments. Microsoft Windows offers a wide range

CTF Challenges, HackTheBox

CAP HacktheBox Walkthrough

October 11, 2021 by raj3 Min Reading

Today CAP – HTB machine will be our target. We will categorize this lab in the beginner’s section to capture the flag. Here, we are

MS-SQL Penetration Testing

MSSQL for Pentester: Extracting Juicy Information

October 6, 2021 by raj3 Min Reading

In this post, you will learn how will can extract sensitive sample information stored in the mssql by using powerupsql and mssql. In our previous

MS-SQL Penetration Testing

MSSQL for Pentester: Command Execution with Extended Stored Procedures

October 1, 2021 by raj3 Min Reading

Extended stored procedures are DLL files that SQL Server references by creating the extended stored procedure, which then points to specific functions or procedures inside

Posts pagination

Previous 1 … 19 20 21 … 155 Next

Categories

Join Our Training Program

Join Our Telegram Channel

Join Our Discord Channel

Cyber Security Mindmap

Follow us on Twitter

Follow us on Linkedin

© All Rights Reserved 2021 Theme: Prefer by Template Sell.