Skip to content
Hacking Articles

Recent Posts

  • AWS EC2 Credentials Theft via SSRF Abuse
  • Privacy Protection: Encrypted Notebooks
  • Privacy Protection: File Sharing
  • Privacy Protection: File Encryption
  • Credential Dumping with NetExec (nxc)

Most Used Categories

  • CTF Challenges (504)
    • VulnHub (311)
    • HackTheBox (164)
  • Penetration Testing (408)
  • Red Teaming (125)
  • Website Hacking (64)
  • Cyber Forensics (68)
  • Privilege Escalation (59)
  • Hacking Tools (33)
  • Pentest Lab Setup (29)

Hacking Articles

Raj Chandel's Blog

  • Courses We Offer
  • CTF Challenges
  • Penetration Testing
  • Web Penetration Testing
  • Red Teaming
  • Donate us
Cloud Security

AWS EC2 Credentials Theft via SSRF Abuse

September 13, 2025September 13, 2025 by Raj

In AWS, small configuration oversights can lead to big security gaps. This lab demonstrates how attackers can leverage a seemingly harmless setup to access sensitive

OSINT

Privacy Protection: Encrypted Notebooks

September 13, 2025September 13, 2025 by Raj

With so much of our work, studies, and personal thoughts moving online, protecting what we write has become just as important as protecting our files

OSINT

Privacy Protection: File Sharing

September 12, 2025September 13, 2025 by Raj

We share files every day, whether photos, documents, reports, or even sensitive business data. But with every click, there is a risk: hackers, malware, data

OSINT

Privacy Protection: File Encryption

September 10, 2025September 10, 2025 by Raj

In this article provides an in-depth walkthrough of four robust file encryption tools—Veracrypt, Picocrypt, Cryptomator, and 7-Zip—highlighting their unique strengths and practical applications. For each

Credential Dumping, Domain Credential, Red Teaming

Credential Dumping with NetExec (nxc)

August 11, 2025August 11, 2025 by Raj

In modern enterprise environments, Active Directory credentials are the ultimate prize for attackers. Whether you’re a red teamer, penetration tester, or adversary simulation professional, gaining

Domain Enumeration, Red Teaming

Active Directory Enumeration: ldeep

July 28, 2025July 28, 2025 by Raj

ldeep is a post-exploitation LDAP enumeration tool designed for use in Active Directory environments. It enables red teamers, security professionals, and penetration testers to query

Red Teaming

Evil-noVNC: A Realistic Phishing Simulation

July 28, 2025July 28, 2025 by Raj

Traditional phishing techniques are no longer enough; modern authentication systems now rely on Multi-Factor Authentication (MFA) for added security. However, attackers are evolving with new

Active Directory Certificate Attack

A Detailed Guide on PassTheCert

July 28, 2025July 28, 2025 by Raj

Pass-the-Certificate is a highly effective Kerberos privilege escalation method that bypasses traditional password-based authentication. Instead of relying on passwords or hashes, it uses X.509 certificates

Cloud Security

AWS: IAM AttachUserPolicy Abuse

July 26, 2025July 26, 2025 by Raj

Cloud computing provides many advantages but also introduces security risks, such as service abuse and IAM policy misconfigurations. Specifically, the ability to attach user policies

Posts pagination

1 2 … 153 Next

Categories

© All Rights Reserved 2024 Theme: Prefer by Template Sell.