Skip to content

Hacking Articles

Raj Chandel's Blog

  • Courses We Offer
  • CTF Challenges
  • Penetration Testing
  • Web Penetration Testing
  • Red Teaming
  • Donate us
Domain Escalation, Privilege Escalation, Red Teaming

Windows Privilege Escalation: Server Operator Group

December 21, 2022 by raj9 Min Reading

In this blog, we dive into a Server Operator exploit scenario for Windows Privilege Escalation, leveraging the commonly overlooked but powerful Server Operator group in

CTF Challenges, HackTheBox

GoodGames HackTheBox Walkthrough

December 20, 2022 by raj12 Min Reading

GoodGames is a Linux machine and is considered an easy box. but it was tricky indeed. On this box, we will begin with a basic

CTF Challenges, HackTheBox

Paper HackTheBox Walkthrough

December 19, 2022 by raj11 Min Reading

Paper is regarded as a simple box, or hackthebox, that runs Linux. We’ll start with a simple port scan on this box and proceed laterally.

CTF Challenges, HackTheBox

Pandora HackTheBox Walkthrough

December 17, 2022 by raj12 Min Reading

Hack the box considers Pandora, a Linux computer, to be a simple box, but it isn’t. Instead of depending just on TCP port results, we

CTF Challenges, HackTheBox

Driver HackTheBox Walkthrough

December 14, 2022 by raj4 Min Reading

The driver is an easy-rated Windows box on the HackTheBox platform. This is designed to understand initial exploitation using an SCF file and further escalate

CTF Challenges, HackTheBox

Timelapse HackTheBox Walkthrough

November 3, 2022 by raj5 Min Reading

Timelapse is an HTB Active Directory machine that is an easy machine but as the concept of initial compromise is unique, therefore, I believe it

CTF Challenges, HackTheBox

Return HackTheBox Walkthrough

October 18, 2022 by raj4 Min Reading

Return is a Windows machine on HTB and is rated as easy, this box is designed over windows that have Weak Service Permission. If summarized,

Penetration Testing

Containers Vulnerability Scanner: Trivy

August 7, 2022 by raj4 Min Reading

This article talks about Trivy, which is a simple and comprehensive vulnerability scanner for containers and other artifacts, suitable for Continuous Integration and Testing. Table

Red Teaming

MimiKatz for Pentester: Kerberos

July 11, 2022 by raj5 Min Reading

Mimikatz for Pentester: Kerberos is a powerful tool used in penetration testing to exploit vulnerabilities in the Kerberos authentication protocol. In this article, we will

Posts pagination

Previous 1 … 12 13 14 … 156 Next

Categories

Join Our Training Program

Join Our Telegram Channel

Join Our Discord Channel

Cyber Security Mindmap

Follow us on Twitter

Follow us on Linkedin

© All Rights Reserved 2021 Theme: Prefer by Template Sell.