Skip to content
Hacking Articles

Recent Posts

  • Privacy Protection: Password Manager
  • Privacy Protection: Browser Extensions
  • Sock Puppets in OSINT
  • Netexec for Pentester: SSH Exploitation
  • Privacy Protection: Instant Messaging

Most Used Categories

  • CTF Challenges (504)
    • VulnHub (311)
    • HackTheBox (164)
  • Penetration Testing (408)
  • Red Teaming (126)
  • Website Hacking (64)
  • Cyber Forensics (68)
  • Privilege Escalation (59)
  • Hacking Tools (33)
  • Pentest Lab Setup (29)

Hacking Articles

Raj Chandel's Blog

  • Courses We Offer
  • CTF Challenges
  • Penetration Testing
  • Web Penetration Testing
  • Red Teaming
  • Donate us
Persistence

Windows Persistence: Shortcut Modification (T1547)

February 28, 2022June 23, 2025 by Raj

According to MITRE, adversaries often use Windows persistence techniques such as shortcut modification to maintain access or escalate privileges. Consequently, in this blog, we explore

Domain Escalation, Privilege Escalation, Red Teaming

Domain Escalation: PetitPotam NTLM Relay to ADCS Endpoints

February 25, 2022June 23, 2025 by Raj

Will Schroeder and Lee Christensen wrote a research paper on this technique which can be referred to here. In ESC8 technique mentioned in the research paper,

Privilege Escalation

Windows Privilege Escalation: PrintNightmare

February 19, 2022May 10, 2025 by Raj

Print Spooler has been on researcher’s radar ever since Stuxnet worm used print spooler’s privilege escalation vulnerability to spread through the network in nuclear enrichment

Privilege Escalation

Windows Privilege Escalation: SpoolFool

February 16, 2022May 10, 2025 by Raj

Introduction Oliver Lyak posted a write-up about a Windows Privilege Escalation vulnerability that persisted in Windows systems even after patching of previous vulnerabilities in Print

CTF Challenges, HackTheBox

Horizontall HackTheBox Walkthrough

February 15, 2022June 19, 2025 by Raj

Horizontall is an “easy” rated CTF Linux box on Hack The Box platform. The box covers initial compromise by exploiting Strapi RCE vulnerability and escalating

Privilege Escalation

Linux Privilege Escalation: PwnKit (CVE 2021-4034)

February 7, 2022May 19, 2025 by Raj

Team Qualys discovered a local privilege escalation vulnerability in PolicyKit’s (polkit) setuid tool pkexec, known as PwnKit (CVE 2021-4034), which allows low-level users to run

Persistence

Domain Persistence: Computer Accounts

February 5, 2022May 11, 2025 by Raj

Typically, while configuring Active Directories, system admins overlook the harm caused by allowing a local administrator account on a system assigned to a specific user.

CTF Challenges, HackTheBox

Anubis HackTheBox Walkthrough

February 4, 2022June 10, 2025 by Raj

Anubis is an “insane” level CTF box available on the HackTheBox platform designed by 4ndr34z. The box covers a real-life scenario of initial exploitation by

Privilege Escalation

Linux Privilege Escalation: Polkit (CVE 2021-3560)

January 30, 2022May 10, 2025 by Raj

According to Red Hat, “Polkit stands for PolicyKit which is a framework that provides an authorization API used by privileged programs.” Pkexec is a tool

Posts pagination

Previous 1 … 13 14 15 … 154 Next

Categories

© All Rights Reserved 2024 Theme: Prefer by Template Sell.