Skip to content
Hacking Articles

Recent Posts

  • Privacy Protection: Browsers
  • Privacy Protection: Password Manager
  • Privacy Protection: Browser Extensions
  • Sock Puppets in OSINT
  • Netexec for Pentester: SSH Exploitation

Most Used Categories

  • CTF Challenges (504)
    • VulnHub (311)
    • HackTheBox (164)
  • Penetration Testing (408)
  • Red Teaming (126)
  • Website Hacking (64)
  • Cyber Forensics (68)
  • Privilege Escalation (59)
  • Hacking Tools (33)
  • Pentest Lab Setup (29)

Hacking Articles

Raj Chandel's Blog

  • Courses We Offer
  • CTF Challenges
  • Penetration Testing
  • Web Penetration Testing
  • Red Teaming
  • Donate us
Persistence

Windows Persistence using WinLogon

April 12, 2020May 25, 2025 by Raj

In this article, we are going to describe the ability of the WinLogon process to provide persistent access to the Target Machine. Table of Content

Credential Dumping

Credential Dumping: Applications

April 10, 2020May 10, 2025 by Raj

This is a sixth article in the Credential Dumping series. In this article, we will learn about dumping the credentials from various applications such as

Credential Dumping

Credential Dumping: SAM

April 8, 2020May 10, 2025 by Raj

Credential Dumping via SAM is a crucial technique in post-exploitation, allowing attackers to extract password hashes from the Security Account Manager (SAM) database on Windows

Credential Dumping, Domain Credential

Credential Dumping: Security Support Provider (SSP)

April 8, 2020July 22, 2025 by Raj

In this article, we will dump the windows login credentials by exploiting SSP. This is our fourth article in the series of credential dumping. Both

Credential Dumping

Credential Dumping: WDigest

April 6, 2020May 30, 2025 by Raj

This is our third article in the series of Credential Dumping. In this article, we will manipulate WDigest.dll to retrieve the system credentials. The methods

Credential Dumping

Credential Dumping: Windows Credential Manager

April 3, 2020May 10, 2025 by Raj

In this article, we learn about dumping system credentials by exploiting credential manager. We will talk about various methods today which can be used in

Persistence

Windows Persistence: RID Hijacking

April 3, 2020May 12, 2025 by Raj

In this post, we will discuss RID hijacking, which is considered to be a persistence technique in terms of the cyber kill chain, and in

Penetration Testing

Comprehensive Guide on CryptCat

April 2, 2020June 6, 2025 by Raj

In this article, we will provide you with some basic functionality of CryptCat and how to get a session from it using this tool. Table

CTF Challenges, VulnHub

VulnUni: 1.0.1: Vulnhub Walkthrough

April 1, 2020June 10, 2025 by Raj

Hello! Everyone and Welcome to yet another CTF challenge from emaragkos, called ‘VulnUni: 1.0.1,’ which is available online on vulnhub for those who want to

Posts pagination

Previous 1 … 56 57 58 … 154 Next

Categories

© All Rights Reserved 2024 Theme: Prefer by Template Sell.