Skip to content

Hacking Articles

Raj Chandel's Blog

  • Courses We Offer
  • CTF Challenges
  • Penetration Testing
  • Web Penetration Testing
  • Red Teaming
  • Donate us
Cyber Forensics

Forensic Investigation: Shellbags

October 26, 2020 by raj6 Min Reading

In this article, we will be focusing on shellbags and its forensic analysis using shellbag explorer. Shellbags are created to enhance the users’ experience by

CTF Challenges, VulnHub

HA: Forensics: Vulnhub Walkthrough

October 23, 2020 by raj10 Min Reading

Today we are going to crack this vulnerable machine called HA: Forensics. This is a Capture the Flag type of challenge. It contains FOUR flags

Threat Hunting

AlienVault: OSSEC (IDS) Deployment

October 23, 2020April 10, 2026 by raj6 Min Reading

In this article, we will discuss of Deployment of OSSEC (IDS) agents to the AlienVault server. OSSEC is an open-source, host-based intrusion detection system (commonly

Cyber Forensics

Forensic Investigation: Pagefile.sys

October 22, 2020 by raj5 Min Reading

In this article, we will learn how to perform a forensic investigation on a Page File. There is a lot of information that can be

Cyber Forensics

Forensic Investigation: Disk Drive Signature

October 20, 2020 by raj3 Min Reading

In this article, we will be using Disk Drive Signature to identify any suspicious changes in systems’ directories or files. Creating such signatures can help

Cyber Forensics

Forensic Investigation : Prefetch File

October 15, 2020 by raj5 Min Reading

In this article, we are going to study an important artifact of Windows, i.e. prefetch files. Every time you do anything on your Windows system,

CTF Challenges, VulnHub

Maskcrafter: 1.1: Vulnhub Walkthrough

October 14, 2020 by raj8 Min Reading

Today we are going to crack this vulnerable machine called Maskcrafter: 1.1. It is created by evdaez. It is a simple Boot to root kind

Pentest Lab Setup, Red Teaming

AlienVault: End user Devices Integration-Lab Setup (Part 2)

October 13, 2020 by raj7 Min Reading

In this part of our lab series, we continue exploring AlienVault End User Devices Integration by setting up Windows and Linux endpoints for centralized monitoring.

Pentest Lab Setup, Red Teaming

SIEM Lab Setup: AlienVault

October 12, 2020April 10, 2026 by raj9 Min Reading

In this guide, we delve into the SIEM Lab Setup AlienVault, focusing on deploying AlienVault OSSIM to monitor system security events, assess vulnerabilities, and perform

Posts pagination

Previous 1 … 43 44 45 … 157 Next

Categories

Join Our Training Program

Join Our Telegram Channel

Join Our Discord Channel

Cyber Security Mindmap

Follow us on Twitter

Follow us on Linkedin

© All Rights Reserved 2021 Theme: Prefer by Template Sell.