Skip to content
Hacking Articles

Recent Posts

  • Privacy Protection: Password Manager
  • Privacy Protection: Browser Extensions
  • Sock Puppets in OSINT
  • Netexec for Pentester: SSH Exploitation
  • Privacy Protection: Instant Messaging

Most Used Categories

  • CTF Challenges (504)
    • VulnHub (311)
    • HackTheBox (164)
  • Penetration Testing (408)
  • Red Teaming (126)
  • Website Hacking (64)
  • Cyber Forensics (68)
  • Privilege Escalation (59)
  • Hacking Tools (33)
  • Pentest Lab Setup (29)

Hacking Articles

Raj Chandel's Blog

  • Courses We Offer
  • CTF Challenges
  • Penetration Testing
  • Web Penetration Testing
  • Red Teaming
  • Donate us
Privilege Escalation

Windows Privilege Escalation: HiveNightmare

November 13, 2021May 10, 2025 by Raj

CVE-2021-36934 also known as SeriousSAM and HiveNightmare vulnerability was discovered by Jonas Lykkegaard in July 2021. Due to an ACL misconfiguration in Windows 10 post-build

Penetration Testing

Powercat for Pentester

October 31, 2021May 13, 2025 by Raj

Powercat is a simple network utility designed to perform low-level network communication operations. It implements the well-known Netcat functionality in Powershell. Interestingly, traditional anti-virus solutions

Privilege Escalation

Windows Privilege Escalation: Logon Autostart Execution (Registry Run Keys)

October 28, 2021May 10, 2025 by Raj

If an attacker finds a service that has all permission and its bind with the Registry run key then he can perform privilege escalation or

Privilege Escalation

Windows Privilege Escalation: Boot Logon Autostart Execution (Startup Folder)

October 26, 2021July 29, 2025 by Raj

The Windows Startup folder may be targeted by an attacker to escalate privileges or perform persistence attacks. By adding an application to a startup folder

Privilege Escalation

Windows Privilege Escalation: Stored Credentials (Runas)

October 20, 2021May 10, 2025 by Raj

Stored Credentials Exploitation is a technique attackers use to increase privileges in Microsoft Windows. Therefore, it allows attackers to escalate their access by exploiting weaknesses

Privilege Escalation

Windows Privilege Escalation: Weak Registry Permission

October 19, 2021May 10, 2025 by Raj

Microsoft Windows offers a wide range of fine-grained permissions and privileges for controlling access to Windows components including services, files, and registry entries. Exploiting Weak

CTF Challenges, HackTheBox

TheNotebook HackTheBox Walkthrough

October 16, 2021June 20, 2025 by Raj

We’ll look at another one of HackTheBox machines today, called “TheNotebook.” It is a medium difficulty box targeting the commonly found threat of using insecure

Privilege Escalation

Windows Privilege Escalation: Unquoted Service Path

October 14, 2021July 29, 2025 by Raj

Microsoft Windows offers a wide range of fine-grained permissions and privileges for controlling access to Windows components including services, files, and registry entries. Exploiting Unquoted

Privilege Escalation

Windows Privilege Escalation: Insecure GUI Application

October 14, 2021September 6, 2025 by Raj

In the series of Privilege escalation, till now we have learned that Microsoft Windows offers a wide range of fine-grained permissions and privileges for controlling

Posts pagination

Previous 1 … 17 18 19 … 154 Next

Categories

© All Rights Reserved 2024 Theme: Prefer by Template Sell.