Skip to content
Hacking Articles

Recent Posts

  • Privacy Protection: Password Manager
  • Privacy Protection: Browser Extensions
  • Sock Puppets in OSINT
  • Netexec for Pentester: SSH Exploitation
  • Privacy Protection: Instant Messaging

Most Used Categories

  • CTF Challenges (504)
    • VulnHub (311)
    • HackTheBox (164)
  • Penetration Testing (408)
  • Red Teaming (126)
  • Website Hacking (64)
  • Cyber Forensics (68)
  • Privilege Escalation (59)
  • Hacking Tools (33)
  • Pentest Lab Setup (29)

Hacking Articles

Raj Chandel's Blog

  • Courses We Offer
  • CTF Challenges
  • Penetration Testing
  • Web Penetration Testing
  • Red Teaming
  • Donate us
Red Teaming

A Detailed Guide on HTML Smuggling

April 19, 2022June 19, 2025 by Raj

HTML Smuggling is an evasive payload delivery method that helps an attacker smuggle payload past content filters and firewalls by hiding malicious payloads inside of

Password Cracking

A Detailed Guide on Medusa

April 15, 2022June 23, 2025 by Raj

Hi Pentesters! Let’s learn about a different tool Medusa, which is intended to be a speedy, parallel and modular, login brute forcer. The goal of

Defense Evasion, Red Teaming

Process Doppelganging (Mitre:T1055.013)

April 14, 2022June 23, 2025 by Raj

Eugene Kogan and Tal Liberman presented a technique for defense evasion called “Process Doppelganging” in Blackhat EU 2017 which can be found here and a

Defense Evasion, Red Teaming

Process Hollowing (Mitre:T1055.012)

April 12, 2022June 23, 2025 by Raj

In July 2011, John Leitch of autosectools.com talked about a technique he called process hollowing in his whitepaper here. Ever since then, many malware campaigns

Red Teaming

A Detailed Guide on AMSI Bypass

April 11, 2022June 23, 2025 by Raj

Windows developed the Antimalware Scan Interface (AMSI) standard that allows a developer to integrate malware defense in his application. AMSI allows an application to interact

Penetration Testing

A Detailed Guide on Responder (LLMNR Poisoning)

April 9, 2022June 23, 2025 by Raj

Responder is a widely used tool in penetration testing scenarios, and red teamers often use it for lateral movement across the network. Additionally, Responder offers

Password Cracking

A Detailed Guide on Cewl

April 7, 2022June 23, 2025 by Raj

Hi, Pentesters! In this article, we are going to focus on the Kali Linux tool “Cewl” which will basically help you to create a wordlist.

Persistence

Windows Persistence: COM Hijacking (MITRE: T1546.015)

April 6, 2022June 23, 2025 by Raj

According to MITRE, “Adversaries can use the COM system to insert malicious code that executes in place of legitimate software by hijacking COM references and

Lateral Movement, Red Teaming

Lateral Movement: Remote Services (Mitre:T1021)

March 27, 2022June 23, 2025 by Raj

During Red Team assessments, after an attacker has compromised a system, they often move laterally through the network, gaining more relevant information on other systems.

Posts pagination

Previous 1 … 11 12 13 … 154 Next

Categories

© All Rights Reserved 2024 Theme: Prefer by Template Sell.