Skip to content

Hacking Articles

Raj Chandel's Blog

  • Courses We Offer
  • CTF Challenges
  • Penetration Testing
  • Web Penetration Testing
  • Red Teaming
  • Donate us
CTF Challenges, HackTheBox

SwagShop HackTheBox Walkthrough

February 5, 2021 by raj5 Min Reading

Today we are going to crack a machine called Admirer. It was created by ch4p. This is a Capture the Flag type of challenge. This

Android Penetration Testing

Android Penetration Testing: Apk Reverse Engineering

February 3, 2021 by raj9 Min Reading

Android reverse engineering refers to the process of decompiling the APK for the purpose of investigating the source code that is running in the background

CTF Challenges, HackTheBox

Blunder HackTheBox Walkthrough

February 3, 2021 by raj7 Min Reading

Today we are going to crack a machine called Admirer. It was created by egotisticalSW. This is a Capture the Flag type of challenge. This

Penetration Testing

Thick Client Penetration Testing: Information Gathering

February 2, 2021 by raj11 Min Reading

In the previous article, we have discussed the reverse engineering of original DVTA application in the Lab setup of Thick Client: DVTA part 2 In

Tunneling & Pivoting

Port Forwarding & Tunnelling Cheatsheet

February 1, 2021 by raj19 Min Reading

In this article, we are going to learn about the concepts and techniques of Port forwarding and Tunnelling. This article stands as an absolute cheatsheet

CTF Challenges, HackTheBox

Admirer HackTheBox Walkthrough

January 29, 2021 by raj8 Min Reading

Today we are going to crack a machine called Admirer. It was created by polarbearer and GibParadox. This is a Capture the Flag type of

Penetration Testing

Comprehensive Guide on Dirsearch

January 24, 2021March 14, 2026 by raj8 Min Reading

In this article, we will learn how we can use Dirsearch. A developer designed a simple command-line tool to brute force directories and files in

Penetration Testing

Android Pentest: Deep Link Exploitation

January 24, 2021March 14, 2026 by raj6 Min Reading

In many situations, an application must work with web-based URLs to build and transfer session IDs, authenticate users using OAuth login, and handle other test

Penetration Testing

Exploiting Stored Cross-Site Scripting at Tenda AC5 AC1200

January 24, 2021 by raj1 Min Reading

While testing Tenda AC5 AC1200 over at the Hacking Articles Research Lab, we uncovered several vulnerabilities in its latest firmware version V15.03.06.47_multi. Thereby in a

Posts pagination

Previous 1 … 33 34 35 … 155 Next

Categories

Join Our Training Program

Join Our Telegram Channel

Join Our Discord Channel

Cyber Security Mindmap

Follow us on Twitter

Follow us on Linkedin

© All Rights Reserved 2021 Theme: Prefer by Template Sell.