Skip to content

Hacking Articles

Raj Chandel's Blog

  • Courses We Offer
  • CTF Challenges
  • Penetration Testing
  • Web Penetration Testing
  • Red Teaming
  • Donate us
CTF Challenges, VulnHub

LemonSqueezy:1 Vulnhub Walkthrough

June 6, 2020 by raj6 Min Reading

Today we are going to solve another boot2root challenge called “LemonSqueezy:1”. It is available on Vulnhub for the purpose of Penetration Testing practices. This lab

CTF Challenges, VulnHub

Victim:1 Vulnhub Walkthrough

June 1, 2020 by raj3 Min Reading

Today we are going to solve another boot2root challenge called “Victim:1”. It is available on Vulnhub for the purpose of Penetration Testing practices. This lab

Credential Dumping, Domain Credential

Credential Dumping: LAPS

May 31, 2020 by raj15 Min Reading

In this article, we will be discussing the concept of Credential Dumping and LAPS (Local Administrator Password Solution). We will delve into the world of

CTF Challenges, VulnHub

Sumo: 1 Vulnhub Walkthrough

May 29, 2020 by raj3 Min Reading

Today, I am going to share a writeup for the boot2root challenge of the Vulnhub machine “Sumo: 1”. It was an intermediate box based on

CTF Challenges, VulnHub

Zion: 1.1 Vulnhub Walkthrough

May 27, 2020 by raj7 Min Reading

Today, I am going to share a writeup for the boot2root challenge of the Vulnhub machine “Zion: 1.1”. It was actually an intermediate box based

Lateral Movement, Red Teaming

Lateral Movement: Pass the Ticket Attack

May 27, 2020 by raj6 Min Reading

After working on Pass the Hash attack and Over the pass attack, it’s time to focus on a similar kind of attack called Pass the

Credential Dumping, Domain Credential

Credential Dumping: DCSync Attack

May 26, 2020 by raj10 Min Reading

Active Directory Credential Dumping DCSync Attack is a specialized technique used by attackers to extract credentials from a domain controller (DC) by simulating the behavior

CTF Challenges, VulnHub

DevRandom CTF:1.1 Vulnhub Walkthrough

May 26, 2020 by raj3 Min Reading

Today we are going to solve another boot2root challenge called “DevRandom CTF:1.1”. It is available on Vulnhub for the purpose of Penetration Testing practices. This

Red Teaming

Abusing Microsoft Outlook 365 to Capture NTLM

May 25, 2020March 14, 2026 by raj5 Min Reading

In this post we will discuss “How the attacker uses the Microsoft office for phishing attack to get the NTLM hashes from Windows.” Since we

Posts pagination

Previous 1 … 53 54 55 … 155 Next

Categories

Join Our Training Program

Join Our Telegram Channel

Join Our Discord Channel

Cyber Security Mindmap

Follow us on Twitter

Follow us on Linkedin

© All Rights Reserved 2021 Theme: Prefer by Template Sell.