Skip to content

Hacking Articles

Raj Chandel's Blog

  • Courses We Offer
  • CTF Challenges
  • Penetration Testing
  • Web Penetration Testing
  • Red Teaming
  • Donate us
DACL Attacks

Abusing AD-DACL: ForceChangePassword

November 14, 2024 by raj6 Min Reading

In this post, we explore ForceChangePassword Active Directory abuse via the exploitation of Discretionary Access Control Lists (DACL) using the ForcePasswordChange permission in Active Directory

DACL Attacks

Abusing AD-DACL : Generic ALL Permissions

October 17, 2024 by raj12 Min Reading

In this post, we explore how attackers can exploit the Generic ALL Active Directory abuse through Discretionary Access Control Lists (DACL). This powerful permission grants

OSINT

OSINT: User Privacy in Linux

September 24, 2024 by raj10 Min Reading

Linux telemetry, which involves gathering and sending data from a Linux-based system to an external server or service, raises concerns about Linux telemetry and privacy.

Penetration Testing

A Detailed Guide on Feroxbuster

September 12, 2024 by raj8 Min Reading

This Feroxbuster guide covers everything you need to know about using this powerful tool to identify directories and files on web servers through brute-force techniques.

MS-SQL Penetration Testing

MSSQL for Pentester: NetExec

August 24, 2024 by raj7 Min Reading

MSSQL NetExec Pentesting is an essential technique for red teamers and penetration testers who want to automate attacks against Microsoft SQL Servers. Moreover, NetExec (nxc)

Database Hacking, Nmap

Penetration Testing on MYSQL (Port 3306)

August 6, 2024 by raj6 Min Reading

Penetration testing on MySQL is essential for identifying potential vulnerabilities in one of the most widely used open-source Relational Database Management Systems (RDBMS). MySQL commonly

Penetration Testing

File Transfer Cheatsheet: Windows and Linux

July 21, 2024 by raj8 Min Reading

File transfer in Windows and Linux is a crucial step in post-exploitation scenarios during penetration testing or red teaming. This article provides a complete cheatsheet

Red Teaming

WinRM Penetration Testing

July 15, 2024 by raj8 Min Reading

WinRM Penetration Testing plays a crucial role in assessing the security of Windows environments. This guide further explores lateral movement, remote shell access, and exploitation

MS-SQL Penetration Testing

MSSQL for Pentester: Command Execution with xp_cmdshell

July 5, 2024 by raj10 Min Reading

xp_cmdshell command execution is a powerful technique available to penetration testers targeting Microsoft SQL Server environments. Microsoft introduced xp_cmdshell with T-SQL in SQL Server 6.0

Posts pagination

Previous 1 … 7 8 9 … 155 Next

Categories

© All Rights Reserved 2021 Theme: Prefer by Template Sell.