Skip to content

Hacking Articles

Raj Chandel's Blog

  • Courses We Offer
  • CTF Challenges
  • Penetration Testing
  • Web Penetration Testing
  • Red Teaming
  • Donate us
Red Teaming

Abusing Microsoft Outlook 365 to Capture NTLM

May 25, 2020March 14, 2026 by raj5 Min Reading

In this post we will discuss “How the attacker uses the Microsoft office for phishing attack to get the NTLM hashes from Windows.” Since we

Lateral Movement, Red Teaming

Lateral Movement: Pass the Ccache

May 25, 2020March 31, 2026 by raj7 Min Reading

Introduction  Pass the Ccache is a credential access and lateral movement technique where an attacker steals or generates a Kerberos ccache file containing a valid TGT, then

CTF Challenges, VulnHub

mhz_cxf: c1f Vulnhub Walkthrough

May 21, 2020 by raj5 Min Reading

CTF’s are a great way to sharpen your axe. As a security enthusiast, this is probably the best way to get some hands-on practice that

CTF Challenges, VulnHub

CengBox: 1 Vulnhub Walkthrough

May 21, 2020 by raj5 Min Reading

Today, I am going to share a writeup for the boot2root challenge of the vulnhub machine “Cengbox:1”. It was an easy box based on the

CTF Challenges, VulnHub

TBBT2: Vulnhub Walkthrough

May 21, 2020 by raj5 Min Reading

TBBT2 is made by emaragkos. This boot2root machine is part of the TBBT Fun with Flags series and it is themed after the famous TV

Red Teaming

Comprehensive Guide on Password Spraying Attack

May 21, 2020March 14, 2026 by raj10 Min Reading

Today we deal with the technique that at first sounds very much similar to Bruteforcing but trust me, it is not brute-force. It is Password

CTF Challenges, VulnHub

Geisha:1: Vulnhub Walkthrough

May 19, 2020 by raj3 Min Reading

Today, I am going to share a writeup for the boot2root challenge of the vulnhub machine “GEISHA”. It was actually an easy box based on

Persistence

Windows Persistence: Accessibility Features

May 18, 2020 by raj7 Min Reading

Today, we are going to shed some light on a very sticky persistence method in Windows systems. In fact, it is so persistent that it

CTF Challenges, VulnHub

Katana: Vulnhub Walkthrough

May 17, 2020 by raj3 Min Reading

Katana VM is made by SunCSR Team. This VM is a purposely built vulnerable lab with the intent of gaining experience in the world of

Posts pagination

Previous 1 … 55 56 57 … 156 Next

Categories

Join Our Training Program

Join Our Telegram Channel

Join Our Discord Channel

Cyber Security Mindmap

Follow us on Twitter

Follow us on Linkedin

© All Rights Reserved 2021 Theme: Prefer by Template Sell.