Hacking Articles

19.9K posts

Hacking Articles banner
Hacking Articles

Hacking Articles

@hackinarticles

House of Pentesters Join us: https://t.co/Y6XOlSOA92

Delhi Katılım Eylül 2009
473 Takip Edilen294.7K Takipçiler
Hacking Articles
Hacking Articles@hackinarticles·
🔥 OSCP+ / CTF Exam Practice Training (Online) – Enroll Now! 🚀 Looking to strengthen your practical penetration testing skills and boost your confidence before the OSCP+ exam? Join Ignite Technologies’ Exclusive Capture The Flag (CTF) Practice Program — designed to simulate real exam scenarios and real-world attack environments. 🔗 Register Here: forms.gle/bowpX9TGEs41GD… 💬 WhatsApp: wa.me/message/HIOPPN… 📧 Email: info@ignitetechnologies.in 📚 What You’ll Cover: 🧠 Introduction to Exam Strategy & Methodology 🌐 Information Gathering & Enumeration 🧱 Vulnerability Scanning & Analysis 🔓 Windows Privilege Escalation 🐧 Linux Privilege Escalation 🛡️ Client-Side Attacks 🌐 Web Application Attacks 🧬 Password Attacks & Credential Exploitation 🧠 Tunneling & Pivoting Techniques 🏰 Active Directory Attacks 💣 Exploiting Public Exploits Effectively 📋 Professional Report Writing 🎯 This training is ideal for: • OSCP+ aspirants • CTF players aiming to go professional • Pentesters wanting structured exam practice • Security professionals strengthening real-world attack skills Limited seats available. Prepare smart. Hack ethically. 🚀 #CyberSecurity #PenetrationTesting #OSCP #CTF #EthicalHacking #RedTeam #InfoSec #ActiveDirectory #SecurityTraining #CyberSecurityCareer
Hacking Articles tweet media
English
0
0
13
1.3K
Hacking Articles
Hacking Articles@hackinarticles·
Credential Dumping: Pre2k 🔥 Telegram: t.me/hackinarticless ✴ Twitter: x.com/hackinarticles Pre2K Active Directory misconfigurations arise from legacy “Pre-Windows 2000” settings that expose weak permissions, default credentials, and excessive access rights—allowing attackers to enumerate, escalate privileges, and even compromise domain controllers. 📚 Topic Covered 🧩 Understanding Pre-Windows 2000 Compatibility ⚙️ Legacy AD Misconfigurations & Risks 🔍 Enumeration using pre2k Tool 🛠 Enumeration using NetExec (nxc) 🔑 Identifying Default Computer Account Passwords 💉 Exploiting Weak AD Permissions 🔄 Changing Computer Account Passwords 🖥 Gaining Access via Evil-WinRM 🚀 Domain Compromise Scenario 🛡 Mitigation & Hardening Techniques 📖 Article: hackingarticles.in/pre2k-active-d… #CyberSecurity #ActiveDirectory #RedTeam #Pentesting #EthicalHacking #InfoSec
Hacking Articles tweet mediaHacking Articles tweet mediaHacking Articles tweet mediaHacking Articles tweet media
English
0
6
27
1.2K
Hacking Articles
Hacking Articles@hackinarticles·
Shadow Credentials Attack 🔥 Telegram: t.me/hackinarticles ✴ Twitter: x.com/hackinarticles Shadow Credentials attack abuses Active Directory Certificate Services (AD CS) by injecting rogue public keys into the msDS-KeyCredentialLink attribute, allowing attackers to authenticate as a target user without knowing their password or NTLM hash. 📚 Topic Covered 📖 Introduction 🧠 Understanding Kerberos & PKINIT 🔑 msDS-KeyCredentialLink Attribute ⚙️ Prerequisites & Lab Setup 🔍 Hunting Weak Permissions (BloodHound) 💉 Injecting Shadow Credentials 📦 Tools: PyWhisker, Certipy, Impacket 🔐 PKINIT Authentication using Certificate 🎟 Obtaining TGT (Kerberos Ticket) 🪪 Extracting NTLM Hash (getnthash.py) 💻 NTLM Relay Attack (ntlmrelayx) 💣 Metasploit Shadow Credentials Module 🚀 Privilege Escalation & Persistence 🛡 Detection (Event ID 4768, 5136) ⚙️ Mitigation & Hardening Techniques 📖 Article: hackingarticles.in/shadow-credent… #CyberSecurity #ActiveDirectory #RedTeam #Pentesting #EthicalHacking #ADCS #Kerberos #InfoSec
Hacking Articles tweet mediaHacking Articles tweet mediaHacking Articles tweet mediaHacking Articles tweet media
English
0
7
27
1.2K
Hacking Articles
Hacking Articles@hackinarticles·
🔴 ADCS ESC8: NTLM Relay to Certificate Services 🔥 Telegram: t.me/hackinarticles ✴ Twitter: x.com/hackinarticles ADCS misconfig + NTLM relay = silent domain takeover ⚠️ ⚡ Attack Highlights 🔍 Identify ADCS Web Enrollment (/certsrv) 🌐 Relay NTLM authentication to CA HTTP endpoint 🎟 Request certificate as victim (DC / Domain Admin) 🔐 Authenticate using issued certificate (PKINIT) 🚀 Full domain compromise without password 💡 ESC8 abuses ADCS Web Enrollment over HTTP → allowing attackers to impersonate privileged accounts via certificate issuance () ⚠️ No exploit needed — just misconfiguration + relay = domain dominance 📖 Article: hackingarticles.in/adcs-esc8-ntlm… #cybersecurity #activedirectory #adcs #redteam #pentesting #infosec #privilegeescalation
Hacking Articles tweet mediaHacking Articles tweet mediaHacking Articles tweet mediaHacking Articles tweet media
English
0
4
12
895
Hacking Articles
Hacking Articles@hackinarticles·
Bug Bounty Training Program (Online) 🔗 Register here: forms.gle/bowpX9TGEs41GD… 💬 WhatsApp: wa.me/message/HIOPPN… 📧 Email: info@ignitetechnologies.in Hurry up, get enrolled yourself with IGNITE TECHNOLOGIES’ fully exclusive Training Program “Bug Bounty.” ✔️ Table of Content 🚀 Introduction to WAPT & OWASP Top 10 🛠️ Pentest Lab Setup 🔍 Information Gathering & Reconnaissance 💻 Netcat for Pentester ⚙️ Configuration Management Testing 🔐 Cryptography 🔑 Authentication 🕒 Session Management 📂 Local File Inclusion 🌐 Remote File Inclusion 📁 Path Traversal 💣 OS Command Injection 🔀 Open Redirect 📤 Unrestricted File Upload 🐚 PHP Web Shells 📝 HTML Injection 🌟 Cross-Site Scripting (XSS) 🔄 Client-Side Request Forgery 🛑 SQL Injection 📜 XXE Injection 🎁 Bonus Section #infosec #cybersecurity #cybersecuritytips #microsoft #redteam #informationsecurity #CyberSec #microsoft #offensivesecurity #infosecurity #cyberattacks #security #oscp #cybersecurityawareness #bugbounty #bugbountytips
Hacking Articles tweet media
English
0
2
21
1.8K
Hacking Articles
Hacking Articles@hackinarticles·
Wireless Penetration Testing: Aircrack-ng 🔥 Telegram: t.me/hackinarticles Aircrack-ng is a popular Wi-Fi security auditing suite used by pentesters to monitor wireless traffic, capture handshakes, and crack weak Wi-Fi passwords during security assessments. ⚡ Key Points 📡 Enable monitor mode to capture wireless traffic 📊 Sniff packets and identify nearby access points and clients 📶 Perform deauthentication attacks to capture WPA handshakes 🔐 Crack WEP / WPA / WPA2 passwords using dictionary attacks 📖 Article: hackingarticles.in/wireless-penet… #CyberSecurity #WiFiSecurity #WirelessPentesting #RedTeam #EthicalHacking
Hacking Articles tweet mediaHacking Articles tweet mediaHacking Articles tweet mediaHacking Articles tweet media
English
1
31
150
6.4K
Hacking Articles
Hacking Articles@hackinarticles·
MSSQL for Pentesters: Impersonate 🔥 Telegram: t.me/hackinarticles Learn how attackers abuse the MSSQL impersonation feature to execute queries as another user and escalate privileges, potentially gaining sysadmin access in the database server. 🧠 Topics covered: • Understanding MSSQL Impersonation • Privilege Escalation using EXECUTE AS • Exploitation with Metasploit • SYSTEM access using Juicy Potato 📖 Read the full guide: hackingarticles.in/mssql-for-pent… #MSSQL #Pentesting #RedTeam #CyberSecurity #Infosec #EthicalHacking #Hacking
Hacking Articles tweet mediaHacking Articles tweet mediaHacking Articles tweet mediaHacking Articles tweet media
English
0
19
96
4.2K
Hacking Articles
Hacking Articles@hackinarticles·
Rustscan Network Scanner: Detailed Guide 🔥 Telegram: t.me/hackinarticles ✴ Twitter: x.com/hackinarticles RustScan is a modern high-speed port scanner written in Rust that helps penetration testers quickly discover open ports and automatically pipe results into Nmap for deeper enumeration. 📚 What You’ll Learn in This Guide ⚡ What Sets RustScan Apart 🚀 Advantages of RustScan over Nmap 🐳 Using RustScan with Docker ⚙️ Installation & Standalone Usage 🎯 RustScan Flags & Options 📖 Article: hackingarticles.in/rustscan-netwo… #CyberSecurity #EthicalHacking #Pentesting #RustScan #NetworkSecurity #InfoSec
Hacking Articles tweet mediaHacking Articles tweet mediaHacking Articles tweet mediaHacking Articles tweet media
English
1
12
63
3.1K
Hacking Articles retweetledi
rootsecdev
rootsecdev@rootsecdev·
I too woke up and choose violence today as the fail-copy POC dropped. Made a clean exploit including fixing the UID post exploitation without rebooting the target server. Smoke those CTF’s in hack the box. github.com/rootsecdev/cve…
English
4
117
559
33K
Hacking Articles
Hacking Articles@hackinarticles·
🚀 Master Active Directory Penetration Testing — Online Training Now Open! Active Directory remains the #1 target in enterprise breaches. If you're serious about red teaming or advancing toward OSCP-level skills, this is the deep-dive you've been waiting for. ✔️ Comprehensive Curriculum: 🔍 Initial Active Directory Exploitation 🔎 Active Directory Post-Enumeration 🔐 Abusing Kerberos 🧰 Advanced Credential Dumping Attacks 📈 Privilege Escalation Techniques 🔄 Persistence Methods 🔀 Lateral Movement Strategies 🛡️ DACL Abuse (New) 🏴 ADCS Attacks (New) 💎 Sapphire & Diamond Ticket Attacks (New) 🎁 Bonus Sessions ⚠️ Limited slots available — secure your spot before they're gone. 🔗 Register Here: forms.gle/bowpX9TGEs41GD… 💬 WhatsApp: wa.me/message/HIOPPN… 📧 Email: info@ignitetechnologies.in Whether you're prepping for red team engagements, OSCP, CRTP, or CRTE — this training will sharpen the exact skills hiring managers and engagement leads look for. Drop a 🔥 in the comments if you're in, or tag someone who needs to level up their AD game. #InfoSec #CyberSecurity #PenTesting #RedTeam #ActiveDirectory #OffensiveSecurity #OSCP #CRTP #EthicalHacking #BugBounty #CyberSecurityAwareness #InformationSecurity #Kerberos #LateralMovement #PrivilegeEscalation
Hacking Articles tweet media
English
0
3
20
2.5K