Skip to content

Hacking Articles

Raj Chandel's Blog

  • Courses We Offer
  • CTF Challenges
  • Penetration Testing
  • Web Penetration Testing
  • Red Teaming
  • Donate us
Red Teaming

Bypassing WDAC and AppLocker Using Ligolo

April 22, 2026April 22, 2026 by raj11 Min Reading

Modern enterprises rely on AppLocker and Windows Defender Application Control (WDAC) to prevent unauthorized binaries from executing. These controls are designed to block: Execution of

Cloud Security

AWS CloudGoat EC2 SSRF Exploitation

April 22, 2026April 22, 2026 by raj10 Min Reading

Cloud environments are increasingly targeted due to misconfigurations rather than software vulnerabilities. One such commonly exploited issue is Server-Side Request Forgery (SSRF), especially when cloud

DACL Attacks

GPO Abuse: Exploiting Vulnerable Group Policy Objects

April 21, 2026April 22, 2026 by raj15 Min Reading

This article walks through a complete GPO-abuse attack chain in a lab domain named ignite.local. We first simulate the misconfiguration by granting a low-privilege user

Red Teaming

Active Directory Lab Setup for Penetration Testing Using PowerShell

April 17, 2026April 21, 2026 by raj14 Min Reading

This article provides a complete walkthrough of both phases — from clicking “Create a New Virtual Machine” in VMware all the way to a fully

Lateral Movement, Red Teaming

Lateral Movement: Enabling RDP Remotely

April 16, 2026April 21, 2026 by raj9 Min Reading

This article presents a hands-on walkthrough demonstrating multiple real-world techniques to remotely enable RDP on a Windows Server 2019 Domain Controller (DC.ignite.local, 192.168.1.11) and subsequently

Penetration Testing

A Detailed Guide on SSH Port forwarding & Tunnelling

April 14, 2026April 15, 2026 by raj16 Min Reading

This article walks through SSH tunnelling in a practical, lab‑oriented way. You will see how to set up a loopback‑bound Apache2 web server as a

Penetration Testing

A Detailed Guide on Local Port Forwarding

April 12, 2026April 16, 2026 by raj19 Min Reading

In the contemporary digital world, penetration testing and red team engagements, direct access to target systems from the attacker’s machine is uncommon. Many services are

Domain Enumeration, Red Teaming

Active Directory Enumeration: Net RPC

April 10, 2026April 14, 2026 by raj13 Min Reading

This article provides a detailed net rpc operations performed against the ignite.local domain (DC: 192.168.1.11). Introduction Active Directory (AD) is the backbone of identity and

Penetration Testing

Network Pivoting using Ligolo-MP – Complete Guide

April 10, 2026April 14, 2026 by raj10 Min Reading

In modern penetration testing, gaining an initial foothold on an internet-facing machine is rarely the end goal. The most sensitive assets — databases, domain controllers,

Posts pagination

1 2 … 158 Next

Categories

Join Our Training Program

Join Our Telegram Channel

Join Our Discord Channel

Cyber Security Mindmap

Follow us on Twitter

Follow us on Linkedin

© All Rights Reserved 2021 Theme: Prefer by Template Sell.