Skip to content

Hacking Articles

Raj Chandel's Blog

  • Courses We Offer
  • CTF Challenges
  • Penetration Testing
  • Web Penetration Testing
  • Red Teaming
  • Donate us
Threat Hunting

Threat Hunting: Velociraptor for Endpoint Monitoring

September 1, 2020 by raj9 Min Reading

A velociraptor is a tool for collecting host-based state information using Velocidex Query Language (VQL) queries. To learn more about Velociraptor, read the documentation on

Penetration Testing

Penetration Testing on CouchDB (5984)

August 31, 2020March 14, 2026 by raj5 Min Reading

What is CouchDB CouchDB is a Free and open-source fault-tolerant NoSQL database developed by Apache software foundation. It uses JSON, to store data, javascript as

Incident Response

Incident Response: Windows Account Management Event (Part 2)

August 29, 2020 by raj4 Min Reading

To perform well and ensure its maintenance, administrators must monitor and manage events on a system, which is extremely important. Meanwhile, administrators use Event Logs,

Incident Response

Incident Response: Windows Account Management Event (Part 1)

August 29, 2020 by raj5 Min Reading

To ensure a system performs well and maintains its integrity, it is extremely important to monitor and manage events on that system. Event Logs, which

Penetration Testing, Pentest Lab Setup

Firewall Lab Setup: Untangle

August 27, 2020 by raj8 Min Reading

What is a Firewall? a firewall is a network security system that monitors and controls the incoming and outgoing network traffic based on predetermined security

Defense Evasion, Red Teaming

Defense Evasion: Alternate Data Streams

August 26, 2020 by raj8 Min Reading

Alternate Data Stream is an artifact of New Technology File system (NTFS) which was introduced by Windows. It was traditionally introduced so that it could

Pentest Lab Setup, Red Teaming

SIEM: Log Monitoring Lab Setup with Splunk

August 26, 2020 by raj8 Min Reading

Splunk Inc. is an American public multinational corporation based in San Francisco, California, that produces software for searching, monitoring, and analyzing machine-generated big data via a Web-style interface. Splunk (the product) captures,

CTF Challenges, VulnHub

DMV :1 Vulnhub Walkthrough

August 25, 2020 by raj5 Min Reading

CTF’s are one of the best and probably the fun way to get hands-on pen testing experience. This one, in particular, is a great CTF

Cyber Forensics

Anti-Forensic: Swipe Footprint with Timestomp

August 25, 2020 by raj6 Min Reading

In this article, we will learn how we can swipe our footprint after hacking the victim’s system. We can achieve that with the help of

Posts pagination

Previous 1 … 46 47 48 … 155 Next

Categories

Join Our Training Program

Join Our Telegram Channel

Join Our Discord Channel

Cyber Security Mindmap

Follow us on Twitter

Follow us on Linkedin

© All Rights Reserved 2021 Theme: Prefer by Template Sell.