Skip to content

Hacking Articles

Raj Chandel's Blog

  • Courses We Offer
  • CTF Challenges
  • Penetration Testing
  • Web Penetration Testing
  • Red Teaming
  • Donate us
Defense Evasion, Red Teaming

Indirect Command Execution: Defense Evasion (T1202)

March 17, 2022 by raj11 Min Reading

Red Teams often use Indirect Command Execution as a defense evasion technique in which an adversary tries to bypass certain defense filters that restrict certain

Website Hacking

A Detailed Guide on httpx

March 14, 2022 by raj11 Min Reading

HTTPx is a fast web application reconnaissance tool coded in Go by projectdiscovery.io. With a plethora of multiple modules effective in manipulating HTTP requests and

Domain Escalation, Privilege Escalation, Red Teaming

Domain Escalation: Resource Based Constrained Delegation

March 12, 2022 by raj11 Min Reading

Resource-Based Constrained Delegation (RBCD) is a security feature in Active Directory (AD) that allows a computer object to specify which users or machines can impersonate

Privilege Escalation

Linux Privilege Escalation: DirtyPipe (CVE 2022-0847)

March 9, 2022 by raj3 Min Reading

Max Kellerman discovered the privilege escalation vulnerability DirtyPipe CVE 2022-0847, which is present in the Linux Kernel itself in post versions 5.8 and allows overwriting

Penetration Testing

A Detailed Guide on Wfuzz

March 5, 2022 by raj12 Min Reading

Many tools now create an HTTP request and let users modify its contents. Similarly, fuzzing works by sending the same type of request multiple times

Penetration Testing

File Transfer Filter Bypass: Exe2Hex

February 28, 2022 by raj5 Min Reading

Exe2hex is a tool that g0tmilk developed, and you can find it here. The tool transcribes EXE into a series of hexadecimal strings, which DEBUG.exe

Persistence

Windows Persistence: Shortcut Modification (T1547)

February 28, 2022 by raj7 Min Reading

According to MITRE, adversaries often use Windows persistence techniques such as shortcut modification to maintain access or escalate privileges. Consequently, in this blog, we explore

Domain Escalation, Privilege Escalation, Red Teaming

Domain Escalation: PetitPotam NTLM Relay to ADCS Endpoints

February 25, 2022 by raj8 Min Reading

Will Schroeder and Lee Christensen wrote a research paper on this technique which can be referred to here. In ESC8 technique mentioned in the research paper,

Privilege Escalation

Windows Privilege Escalation: PrintNightmare

February 19, 2022 by raj10 Min Reading

Print Spooler has been on researcher’s radar ever since Stuxnet worm used print spooler’s privilege escalation vulnerability to spread through the network in nuclear enrichment

Posts pagination

Previous 1 … 15 16 17 … 156 Next

Categories

Join Our Training Program

Join Our Telegram Channel

Join Our Discord Channel

Cyber Security Mindmap

Follow us on Twitter

Follow us on Linkedin

© All Rights Reserved 2021 Theme: Prefer by Template Sell.