Skip to content

Hacking Articles

Raj Chandel's Blog

  • Courses We Offer
  • CTF Challenges
  • Penetration Testing
  • Web Penetration Testing
  • Red Teaming
  • Donate us
Red Teaming

Remote Code Execution Using Impacket

June 20, 2020March 14, 2026 by raj3 Min Reading

In this post, we are going to discuss how we can connect to Victims machine remotely using Python libraries “Impacket” which you can download from

CTF Challenges, VulnHub

HA: Pandavas Vulnhub Walkthrough

June 16, 2020 by raj5 Min Reading

Today we’re going to solve another boot2root challenge called “Pandavas”. It’s available at Vulnhub for penetration testing practice. This lab is not difficult if we

Red Teaming

Kerberoasting and Pass the Ticket Attack Using Linux

June 14, 2020March 14, 2026 by raj4 Min Reading

In our previous post, we explained the Kerberoasting attack in detail, which you can read from here. I recommend, then, to revisit our previous article

CTF Challenges, HackTheBox

HacktheBox: Monteverde Walkthrough

June 13, 2020 by raj3 Min Reading

Today we’re going to solve Hack The Box’s “Monteverde” machine. This lab is of “medium” level, although you will see that it is quite simple.

Credential Dumping, Domain Credential

Credential Dumping: Domain Cache Credential

June 13, 2020 by raj4 Min Reading

In this post, we are going to discuss the domain cache credential attack and various technique to extract the password hashes by exploiting domain user.

CTF Challenges, VulnHub

HA: Natraj Vulnhub Walkthrough

June 11, 2020 by raj4 Min Reading

Today we’re going to solve another boot2root challenge called “Natraj”. It’s available at Vulnhub for penetration testing practice. This lab is not difficult if we

Persistence

Domain Persistence: DC Shadow Attack

June 8, 2020 by raj3 Min Reading

In this post, we are going to discuss the most dynamic attack on AD, named as DC Shadow attack for Domain Persistence. It is part

Persistence

Domain Persistence AdminSDHolder

June 6, 2020 by raj3 Min Reading

In this post, we will discuss the Persistence attack on Active Directory by abusing AdminSDHolder. This attack is an actual threat because of This attack

CTF Challenges, VulnHub

Seppuku:1 Vulnhub Walkthrough

June 6, 2020 by raj5 Min Reading

Today we are going to crack this machine called “Seppuku:1”. It is available on Vulnhub for the purpose of Penetration Testing practices. It was an

Posts pagination

Previous 1 … 52 53 54 … 155 Next

Categories

Join Our Training Program

Join Our Telegram Channel

Join Our Discord Channel

Cyber Security Mindmap

Follow us on Twitter

Follow us on Linkedin

© All Rights Reserved 2021 Theme: Prefer by Template Sell.