Hacking Articles

19.5K posts

Hacking Articles banner
Hacking Articles

Hacking Articles

@hackinarticles

House of Pentesters Join us: https://t.co/Y6XOlSOA92

Delhi Se unió Eylül 2009
460 Siguiendo290.2K Seguidores
Hacking Articles
Hacking Articles@hackinarticles·
OSEP Exam Practice Training (Online) – Registration Open! 🚀 Ready to level up your offensive security skills and prepare for advanced red team operations? Join Ignite Technologies’ Exclusive “Capture The Flag” (CTF) Based OSEP Practice Program and train in a real-world, attack-driven environment designed for serious cybersecurity professionals. 🔗 Register Now: forms.gle/bowpX9TGEs41GD… 💬 WhatsApp: wa.me/message/HIOPPN… 📧 Email: info@ignitetechnologies.in 📚 Training Modules Include: 🚀 Introduction 🔍 Advanced Information Gathering 🎯 Initial Access & Client-Side Attacks 🛡️ Bypassing Security Controls 🪟 Windows Privilege Escalation 🐧 Linux Privilege Escalation 🧭 Active Directory Enumeration 🔁 Lateral Movement 🏰 Active Directory Attacks 🌐 Web Application Attacks 🕳️ Tunneling & Pivoting 🧬 Post-Exploitation & Persistence 🥷 Defense Evasion & OPSEC 🧪 Custom Malware & Tool Development 💥 Advanced Exploitation 📝 Reporting & Documentation This program is ideal for professionals preparing for advanced offensive security certifications and those aiming to strengthen their red teaming capabilities. Seats are limited. Secure yours today. 🚀 #CyberSecurity #InfoSec #EthicalHacking #RedTeam #PenetrationTesting #CloudSecurity #OSCP #OSEP #ActiveDirectory #SecurityTraining #CyberSecurityTraining
Hacking Articles tweet media
English
0
0
6
1.2K
Hacking Articles
Hacking Articles@hackinarticles·
AMSI Bypass: A Detailed Guide 🔥 Telegram: t.me/hackinarticles ✴ Twitter: x.com/hackinarticles AMSI (Antimalware Scan Interface) protects against script-based attacks—but attackers continuously find ways to bypass it and execute malicious payloads undetected. ⚡ Key Bypass Techniques ⬇️ PowerShell downgrade (v2 bypass) 🔀 Obfuscation of malicious strings ⚠️ Forcing AMSI initialization failure 🧠 Memory hijacking (AmsiScanBuffer patch) 🧬 Reflection-based in-memory bypass 🛠️ Automated scripts (Nishang framework) 💡 Modern defenses detect many public bypasses, but attackers still rely on obfuscation and memory patching to evade signature-based detection. 📖 Article: hackingarticles.in/a-detailed-gui… #CyberSecurity #EthicalHacking #RedTeam #Pentesting #AMSI #Bypass #InfoSec #WindowsSecurity
Hacking Articles tweet mediaHacking Articles tweet mediaHacking Articles tweet mediaHacking Articles tweet media
English
0
2
20
1.4K
Hacking Articles
Hacking Articles@hackinarticles·
Mimikatz: Kerberos Attacks for Pentesters 🔥 Telegram: t.me/hackinarticles ✴ Twitter: x.com/hackinarticles Kerberos is a prime target in Active Directory attacks. Using Mimikatz, attackers can extract, forge, and abuse tickets to escalate privileges and move laterally across the domain. ⚡ Key Techniques 🎟️ Dump Kerberos tickets (kerberos::list) 📤 Export tickets (.kirbi format) 🔁 Pass-the-Ticket (PTT) attacks 👑 Golden Ticket (TGT forgery) 🔐 Extract Kerberos hashes 💡 With domain SID + KRBTGT hash, attackers can forge Golden Tickets and gain long-term persistence with admin-level access. 📖 Article: hackingarticles.in/mimikatz-for-p… #CyberSecurity #EthicalHacking #RedTeam #Pentesting #ActiveDirectory #Kerberos #Mimikatz #InfoSec
Hacking Articles tweet mediaHacking Articles tweet mediaHacking Articles tweet mediaHacking Articles tweet media
English
0
12
59
1.9K
Hacking Articles
Hacking Articles@hackinarticles·
Chisel Port Forwarding: A Detailed Guide 🔥 Telegram: t.me/hackinarticles ✴ Twitter: x.com/hackinarticles Chisel is a fast and lightweight TCP/UDP tunneling tool written in Golang that allows penetration testers to bypass firewalls and access internal services securely using HTTP tunnels and SSH encryption. () ⚡ Key Techniques Covered 🔁 Reverse Port Forwarding 🔌 Local Port Forwarding 🌐 SOCKS5 Proxy Tunneling 🧭 Network Pivoting 📡 Internal Service Access 🛠️ Tools & Utilities Used 💻 Chisel Server & Client 🧰 Proxychains 🌐 SOCKS5 Proxy 🖥️ Netcat (nc) 🔗 VNC Viewer / FTP / Telnet 📖 Article: hackingarticles.in/chisel-port-fo… #CyberSecurity #EthicalHacking #RedTeam #Pentesting #Pivoting #PortForwarding #InfoSec
Hacking Articles tweet mediaHacking Articles tweet mediaHacking Articles tweet mediaHacking Articles tweet media
English
0
9
64
2.6K
Hacking Articles
Hacking Articles@hackinarticles·
Active Directory Enumeration: BloodHound 🔥 Telegram: t.me/hackinarticles ✴ Twitter: x.com/hackinarticles Understanding Active Directory relationships is key to domain compromise. BloodHound maps complex permissions & attack paths, helping attackers and defenders visualize privilege escalation routes. ⚡ Key Capabilities 📊 Graph-based AD analysis 🔍 Identify shortest path to Domain Admin 👤 Find Kerberoastable & AS-REP users 🛠️ Detect DCSync & privilege escalation paths 💡 BloodHound collects domain data and visualizes hidden relationships, making it easier to uncover attack paths that are otherwise difficult to detect. 📖 Article: hackingarticles.in/active-directo… #CyberSecurity #EthicalHacking #RedTeam #Pentesting #ActiveDirectory #BloodHound #InfoSec
Hacking Articles tweet mediaHacking Articles tweet mediaHacking Articles tweet mediaHacking Articles tweet media
English
0
18
119
5.4K
Hacking Articles retuiteado
Alex Neff
Alex Neff@al3x_n3ff·
Collecting ADCS data with NetExec🔥 Thanks to the addition of CertiHound, developed and implemented by 0x0Trace, we can now collect ADCS data using the --bloodhound collector of NetExec. As before, the data is exported as JSON files that can be imported directly into BloodHound.
Alex Neff tweet media
English
2
58
243
8.6K
Hacking Articles
Hacking Articles@hackinarticles·
🔥 Ethical Hacking Proactive Training – Live & Practical 🔥 Ready to build real-world cybersecurity skills with hands-on experience? 🚀 Ignite Technologies brings you a comprehensive Ethical Hacking Proactive Training Program designed with live sessions and core practical exposure — at an affordable price. 🔗 Register Now: forms.gle/bowpX9TGEs41GD… 💬 WhatsApp: wa.me/message/HIOPPN… 📧 Email: info@ignitetechnologies.in 🎯 Book Your Demo Session Today! 📘 What You’ll Learn: ✅ Introduction to Ethical Hacking ✅ Old School Learning Methodology ✅ Networking Fundamentals ✅ Reconnaissance (Footprinting, Scanning & Enumeration) ✅ System Hacking ✅ Post Exploitation & Persistence ✅ Web Server Penetration Testing ✅ Website Hacking Techniques ✅ Malware Threats & Analysis ✅ Wireless Network Security ✅ Cryptography & Steganography ✅ Sniffing Attacks ✅ Denial of Service (DoS) ✅ Evading IDS, Firewalls & Honeypots ✅ Social Engineering Techniques ✅ Mobile Platform Security 💡 Whether you're a beginner or looking to strengthen your penetration testing skills, this training is structured to provide practical knowledge aligned with real-world attack scenarios. Limited seats available. Secure yours now. #CyberSecurity #EthicalHacking #Infosec #PenetrationTesting #RedTeam #NetworkSecurity #BugBounty #CyberSecurityTraining #InformationSecurity #TechCareers
Hacking Articles tweet media
English
0
0
6
1K
Hacking Articles
Hacking Articles@hackinarticles·
Firefox for Pentester: Hacktool 🔥 Telegram: t.me/hackinarticles ✴ Twitter: x.com/hackinarticles Hacktool is a browser extension for Firefox and Chrome that provides a penetration-testing cheat sheet containing ready-to-use payloads, commands, and encoding utilities useful during web application testing. 📚 Features Covered in This Guide 🐚 Reverse Shell 🐘 PHP Reverse Shell 🖥 TTY Spawn Shell 🐧 Useful Linux Commands ⚡ PowerShell Handy Commands 📂 File Transfer Techniques 📁 Local File Inclusion (LFI) 💉 Cross-Site Scripting (XSS) 🗄 SQL Injection Payloads 🔐 Base64 Encoder / Decoder 🔑 Hash Generator 🌐 URL Encoder / Decoder 🔢 Hexadecimal Encoder / Decoder 🧩 Template Injection (SSTI) 📡 Exploit Feed RSS 📖 Article: hackingarticles.in/firefox-for-pe… #CyberSecurity #EthicalHacking #Pentesting #BugBounty #WebSecurity #InfoSec
Hacking Articles tweet mediaHacking Articles tweet mediaHacking Articles tweet mediaHacking Articles tweet media
English
0
27
148
5.8K
Hacking Articles
Hacking Articles@hackinarticles·
📡 Wireless Penetration Testing – Pentester Cheatsheet 🔥 Telegram: t.me/hackinarticles ✴ Twitter: x.com/hackinarticles A practical Wireless Penetration Testing reference guide for Red Teamers, penetration testers, and security researchers. This cheatsheet covers Wi-Fi reconnaissance, handshake capture, password cracking, and wireless attack frameworks used during real-world wireless security assessments. ⚡ Topics Covered: 📶 Fern 🔑 Password Cracking 🕵️ Detect Hidden SSID 🧬 PMKID Attack ⚔️ Airgeddon 📡 Aircrack-ng 🎣 Fluxion 🌐 Bettercap ⚡ Wifite 📊 SSID Discovery 🛠 Wifipumpkin3 🎯 Useful for Wi-Fi security assessments, Red Team operations, OSCP preparation, and network penetration testing. 🔗 GitHub Repository: github.com/Ignitetechnolo… #CyberSecurity #WirelessSecurity #WifiHacking #Pentesting #RedTeam #EthicalHacking #Infosec 🚀
Hacking Articles tweet media
English
0
18
99
3.4K
Hacking Articles
Hacking Articles@hackinarticles·
Privacy Protection: Tools & Resources 🔥 Telegram: t.me/hackinarticles ✴ Twitter: x.com/hackinarticles In today’s digital world, protecting your privacy is more critical than ever. From tracking to data leaks, your personal information is constantly at risk. Strengthen your defenses with the right tools & practices. ⚡ What You’ll Find 🔐 Privacy-focused tools 🛡️ Security best practices 🌐 Anonymity & tracking protection 📂 Useful resources for researchers & pentesters 💡 Open-source resources help reduce risks like data exposure and credential leaks, which are a major security concern in public repositories 📖 Repo: github.com/Ignitetechnolo… #CyberSecurity #Privacy #InfoSec #OSINT #Pentesting #SecurityTools
Hacking Articles tweet media
English
0
13
84
3.8K
Hacking Articles
Hacking Articles@hackinarticles·
🔥 OSCP+ / CTF Exam Practice Training (Online) – Enroll Now! 🚀 Looking to strengthen your practical penetration testing skills and boost your confidence before the OSCP+ exam? Join Ignite Technologies’ Exclusive Capture The Flag (CTF) Practice Program — designed to simulate real exam scenarios and real-world attack environments. 🔗 Register Here: forms.gle/bowpX9TGEs41GD… 💬 WhatsApp: wa.me/message/HIOPPN… 📧 Email: info@ignitetechnologies.in 📚 What You’ll Cover: 🧠 Introduction to Exam Strategy & Methodology 🌐 Information Gathering & Enumeration 🧱 Vulnerability Scanning & Analysis 🔓 Windows Privilege Escalation 🐧 Linux Privilege Escalation 🛡️ Client-Side Attacks 🌐 Web Application Attacks 🧬 Password Attacks & Credential Exploitation 🧠 Tunneling & Pivoting Techniques 🏰 Active Directory Attacks 💣 Exploiting Public Exploits Effectively 📋 Professional Report Writing 🎯 This training is ideal for: • OSCP+ aspirants • CTF players aiming to go professional • Pentesters wanting structured exam practice • Security professionals strengthening real-world attack skills Limited seats available. Prepare smart. Hack ethically. 🚀 #CyberSecurity #PenetrationTesting #OSCP #CTF #EthicalHacking #RedTeam #InfoSec #ActiveDirectory #SecurityTraining #CyberSecurityCareer
Hacking Articles tweet media
English
0
2
13
1.4K