Skip to content

Hacking Articles

Raj Chandel's Blog

  • Courses We Offer
  • CTF Challenges
  • Penetration Testing
  • Web Penetration Testing
  • Red Teaming
  • Donate us
Red Teaming

Impacket for Pentester: MSSQL Exploitation

March 20, 2026March 20, 2026 by raj6 Min Reading

Introduction Microsoft SQL Server (MSSQL) remains one of the most widely deployed relational database systems in enterprise environments. During penetration tests and red team engagements,

Domain Enumeration, Red Teaming

Active Directory Enumeration: BloodHound

March 19, 2026March 19, 2026 by raj11 Min Reading

BloodHound Community Edition (CE) is a powerful open-source tool used by penetration testers and red team operators to analyze Active Directory (AD) environments. It maps

Red Teaming

NetExec for Pentester: Command Execution

March 18, 2026March 18, 2026 by raj7 Min Reading

NetExec (nxc) is a powerful post-exploitation and lateral movement tool used by penetration testers to interact with remote systems over protocols like SMB, WinRM, SSH,

Penetration Testing

PostgreSQL Penetration Testing

March 15, 2026March 17, 2026 by raj11 Min Reading

PostgreSQL is one of the most popular open-source relational database systems, powering everything from small web applications to enterprise-scale platforms. Its widespread adoption makes it

Red Teaming

DotNetToJScript: Execute C# from Jscript

February 10, 2026March 17, 2026 by raj10 Min Reading

Modern enterprise environments rarely depend on a single security control. Instead, organizations commonly deploy application whitelisting (AppLocker / WDAC), endpoint protection, and user privilege restrictions

OSINT

Privacy Protection Checklist

January 16, 2026 by raj7 Min Reading

In today’s internet, privacy isn’t a feature, it’s a fight. Trackers, advertisers, data brokers, and even ISPs quietly map your behavior every second you stay

Cloud Security

AWS: IAM UpdateLoginProfile Abuse

January 16, 2026 by raj8 Min Reading

Identity and Access Management (IAM) is the foundation of security in every cloud platform. Misconfigurations or over-privileged identities are among the most common causes of

OSINT

Privacy Protection: Cover Your Tracks

November 5, 2025 by raj7 Min Reading

When you browse the internet, your browser is not just loading pages — it is also quietly sharing information about you. Things like your IP

OSINT

Privacy Protection Mobile – Graphene OS Setup

October 29, 2025 by raj6 Min Reading

Before we dive into the setup process, it’s important to understand why GrapheneOS stands out from standard Android and why it’s perfect for privacy-conscious users.

Posts pagination

1 2 … 155 Next

Categories

Join Our Training Program

Join Our Telegram Channel

Join Our Discord Channel

Cyber Security Mindmap

Follow us on Twitter

Follow us on Linkedin

© All Rights Reserved 2021 Theme: Prefer by Template Sell.