Hacking Articles

19.6K posts

Hacking Articles banner
Hacking Articles

Hacking Articles

@hackinarticles

House of Pentesters Join us: https://t.co/Y6XOlSOA92

Delhi 加入时间 Eylül 2009
460 关注290.3K 粉丝
Hacking Articles
Hacking Articles@hackinarticles·
🔥 OSCP+ / CTF Exam Practice Training (Online) – Enroll Now! 🚀 Looking to strengthen your practical penetration testing skills and boost your confidence before the OSCP+ exam? Join Ignite Technologies’ Exclusive Capture The Flag (CTF) Practice Program — designed to simulate real exam scenarios and real-world attack environments. 🔗 Register Here: forms.gle/bowpX9TGEs41GD… 💬 WhatsApp: wa.me/message/HIOPPN… 📧 Email: info@ignitetechnologies.in 📚 What You’ll Cover: 🧠 Introduction to Exam Strategy & Methodology 🌐 Information Gathering & Enumeration 🧱 Vulnerability Scanning & Analysis 🔓 Windows Privilege Escalation 🐧 Linux Privilege Escalation 🛡️ Client-Side Attacks 🌐 Web Application Attacks 🧬 Password Attacks & Credential Exploitation 🧠 Tunneling & Pivoting Techniques 🏰 Active Directory Attacks 💣 Exploiting Public Exploits Effectively 📋 Professional Report Writing 🎯 This training is ideal for: • OSCP+ aspirants • CTF players aiming to go professional • Pentesters wanting structured exam practice • Security professionals strengthening real-world attack skills Limited seats available. Prepare smart. Hack ethically. 🚀 #CyberSecurity #PenetrationTesting #OSCP #CTF #EthicalHacking #RedTeam #InfoSec #ActiveDirectory #SecurityTraining #CyberSecurityCareer
Hacking Articles tweet media
English
0
1
13
1.1K
Hacking Articles
Hacking Articles@hackinarticles·
Burp Suite for Pentester: Turbo Intruder 🔥 Telegram: t.me/hackinarticles ✴ Twitter: x.com/hackinarticles Turbo Intruder is a powerful Burp Suite extension designed to send a massive number of HTTP requests at high speed for fuzzing and brute-force attacks. It uses HTTP pipelining and customizable Python scripts to perform advanced testing scenarios with low memory usage. () ⚡ Key Features of Turbo Intruder 🚀 Ultra-fast HTTP request fuzzing 🐍 Customizable Python attack scripts 📦 Handles millions of payloads efficiently 🔗 Uses HTTP pipelining for reduced latency ⚙️ Supports multi-parameter fuzzing attacks 🎯 Common Security Testing Scenarios 🔐 Password brute-force attacks 🧪 Race condition testing 📡 Parameter fuzzing 🔎 Authentication bypass testing ⚡ High-volume request attacks 📖 Article: hackingarticles.in/burp-suite-for… #CyberSecurity #EthicalHacking #BurpSuite #Pentesting #BugBounty #InfoSec #WebSecurity
Hacking Articles tweet mediaHacking Articles tweet mediaHacking Articles tweet mediaHacking Articles tweet media
English
0
10
77
3.7K
Hacking Articles
Hacking Articles@hackinarticles·
Burp Suite for Pentester: Active Scan++ 🔥 Telegram: t.me/hackinarticles ✴ Twitter: x.com/hackinarticles Active Scan++ is a powerful extension that enhances vulnerability detection in Burp Suite by adding additional active and passive scanning checks. It helps penetration testers identify advanced web application vulnerabilities that may be missed by default scans. ⚡ Key Features of Active Scan++ 🔍 Advanced active & passive scanning 🧩 Integration with Burp Suite BApp Store ⚙️ Supports Jython-based scanning modules 🛡️ Detects complex web vulnerabilities 📡 Improves automated testing coverage 🎯 Vulnerabilities Detected 💥 Host Header Injection 🧪 XML Injection 🧬 Template Injection 🌐 DNS Rebinding ⚡ Cache Poisoning 📖 Article: hackingarticles.in/burp-suite-for… #CyberSecurity #EthicalHacking #BurpSuite #Pentesting #BugBounty #InfoSec #WebSecurity
Hacking Articles tweet mediaHacking Articles tweet mediaHacking Articles tweet mediaHacking Articles tweet media
English
0
9
49
2.1K
Hacking Articles
Hacking Articles@hackinarticles·
Impacket for Pentester – MSSQL Exploitation 🔥 Telegram: t.me/hackinarticles ✴ Twitter: x.com/hackinarticles MSSQL servers are high-value targets in internal networks — and tools like Impacket make exploitation powerful & flexible 🔐 🛠️ In this guide you’ll learn: 🔍 MSSQL enumeration & access using Impacket 🔐 Authentication techniques (Windows & SQL) ⚙️ Command execution via xp_cmdshell 📂 Data extraction & privilege escalation 🔗 Linked server exploitation & lateral movement 🚀 Real-world pentesting workflows ⚡ Exploit MSSQL like a pro and level up your internal network attacks. 📖 Read the full guide: hackingarticles.in/impacket-for-p… #Impacket #Pentesting #RedTeam #CyberSecurity #MSSQL #InfoSec 🚀
Hacking Articles tweet mediaHacking Articles tweet mediaHacking Articles tweet mediaHacking Articles tweet media
English
0
7
34
1.2K
Hacking Articles
Hacking Articles@hackinarticles·
OSEP Exam Practice Training (Online) – Registration Open! 🚀 Ready to level up your offensive security skills and prepare for advanced red team operations? Join Ignite Technologies’ Exclusive “Capture The Flag” (CTF) Based OSEP Practice Program and train in a real-world, attack-driven environment designed for serious cybersecurity professionals. 🔗 Register Now: forms.gle/bowpX9TGEs41GD… 💬 WhatsApp: wa.me/message/HIOPPN… 📧 Email: info@ignitetechnologies.in 📚 Training Modules Include: 🚀 Introduction 🔍 Advanced Information Gathering 🎯 Initial Access & Client-Side Attacks 🛡️ Bypassing Security Controls 🪟 Windows Privilege Escalation 🐧 Linux Privilege Escalation 🧭 Active Directory Enumeration 🔁 Lateral Movement 🏰 Active Directory Attacks 🌐 Web Application Attacks 🕳️ Tunneling & Pivoting 🧬 Post-Exploitation & Persistence 🥷 Defense Evasion & OPSEC 🧪 Custom Malware & Tool Development 💥 Advanced Exploitation 📝 Reporting & Documentation This program is ideal for professionals preparing for advanced offensive security certifications and those aiming to strengthen their red teaming capabilities. Seats are limited. Secure yours today. 🚀 #CyberSecurity #InfoSec #EthicalHacking #RedTeam #PenetrationTesting #CloudSecurity #OSCP #OSEP #ActiveDirectory #SecurityTraining #CyberSecurityTraining
Hacking Articles tweet media
English
0
0
11
1.7K
Hacking Articles
Hacking Articles@hackinarticles·
AMSI Bypass: A Detailed Guide 🔥 Telegram: t.me/hackinarticles ✴ Twitter: x.com/hackinarticles AMSI (Antimalware Scan Interface) protects against script-based attacks—but attackers continuously find ways to bypass it and execute malicious payloads undetected. ⚡ Key Bypass Techniques ⬇️ PowerShell downgrade (v2 bypass) 🔀 Obfuscation of malicious strings ⚠️ Forcing AMSI initialization failure 🧠 Memory hijacking (AmsiScanBuffer patch) 🧬 Reflection-based in-memory bypass 🛠️ Automated scripts (Nishang framework) 💡 Modern defenses detect many public bypasses, but attackers still rely on obfuscation and memory patching to evade signature-based detection. 📖 Article: hackingarticles.in/a-detailed-gui… #CyberSecurity #EthicalHacking #RedTeam #Pentesting #AMSI #Bypass #InfoSec #WindowsSecurity
Hacking Articles tweet mediaHacking Articles tweet mediaHacking Articles tweet mediaHacking Articles tweet media
English
0
3
32
2.1K
Hacking Articles
Hacking Articles@hackinarticles·
Mimikatz: Kerberos Attacks for Pentesters 🔥 Telegram: t.me/hackinarticles ✴ Twitter: x.com/hackinarticles Kerberos is a prime target in Active Directory attacks. Using Mimikatz, attackers can extract, forge, and abuse tickets to escalate privileges and move laterally across the domain. ⚡ Key Techniques 🎟️ Dump Kerberos tickets (kerberos::list) 📤 Export tickets (.kirbi format) 🔁 Pass-the-Ticket (PTT) attacks 👑 Golden Ticket (TGT forgery) 🔐 Extract Kerberos hashes 💡 With domain SID + KRBTGT hash, attackers can forge Golden Tickets and gain long-term persistence with admin-level access. 📖 Article: hackingarticles.in/mimikatz-for-p… #CyberSecurity #EthicalHacking #RedTeam #Pentesting #ActiveDirectory #Kerberos #Mimikatz #InfoSec
Hacking Articles tweet mediaHacking Articles tweet mediaHacking Articles tweet mediaHacking Articles tweet media
English
0
21
102
3.9K
Hacking Articles
Hacking Articles@hackinarticles·
Chisel Port Forwarding: A Detailed Guide 🔥 Telegram: t.me/hackinarticles ✴ Twitter: x.com/hackinarticles Chisel is a fast and lightweight TCP/UDP tunneling tool written in Golang that allows penetration testers to bypass firewalls and access internal services securely using HTTP tunnels and SSH encryption. () ⚡ Key Techniques Covered 🔁 Reverse Port Forwarding 🔌 Local Port Forwarding 🌐 SOCKS5 Proxy Tunneling 🧭 Network Pivoting 📡 Internal Service Access 🛠️ Tools & Utilities Used 💻 Chisel Server & Client 🧰 Proxychains 🌐 SOCKS5 Proxy 🖥️ Netcat (nc) 🔗 VNC Viewer / FTP / Telnet 📖 Article: hackingarticles.in/chisel-port-fo… #CyberSecurity #EthicalHacking #RedTeam #Pentesting #Pivoting #PortForwarding #InfoSec
Hacking Articles tweet mediaHacking Articles tweet mediaHacking Articles tweet mediaHacking Articles tweet media
English
0
17
92
3.6K
Hacking Articles
Hacking Articles@hackinarticles·
Active Directory Enumeration: BloodHound 🔥 Telegram: t.me/hackinarticles ✴ Twitter: x.com/hackinarticles Understanding Active Directory relationships is key to domain compromise. BloodHound maps complex permissions & attack paths, helping attackers and defenders visualize privilege escalation routes. ⚡ Key Capabilities 📊 Graph-based AD analysis 🔍 Identify shortest path to Domain Admin 👤 Find Kerberoastable & AS-REP users 🛠️ Detect DCSync & privilege escalation paths 💡 BloodHound collects domain data and visualizes hidden relationships, making it easier to uncover attack paths that are otherwise difficult to detect. 📖 Article: hackingarticles.in/active-directo… #CyberSecurity #EthicalHacking #RedTeam #Pentesting #ActiveDirectory #BloodHound #InfoSec
Hacking Articles tweet mediaHacking Articles tweet mediaHacking Articles tweet mediaHacking Articles tweet media
English
0
18
127
6.2K
Hacking Articles 已转推
Alex Neff
Alex Neff@al3x_n3ff·
Collecting ADCS data with NetExec🔥 Thanks to the addition of CertiHound, developed and implemented by 0x0Trace, we can now collect ADCS data using the --bloodhound collector of NetExec. As before, the data is exported as JSON files that can be imported directly into BloodHound.
Alex Neff tweet media
English
2
68
277
11.2K
Hacking Articles
Hacking Articles@hackinarticles·
🔥 Ethical Hacking Proactive Training – Live & Practical 🔥 Ready to build real-world cybersecurity skills with hands-on experience? 🚀 Ignite Technologies brings you a comprehensive Ethical Hacking Proactive Training Program designed with live sessions and core practical exposure — at an affordable price. 🔗 Register Now: forms.gle/bowpX9TGEs41GD… 💬 WhatsApp: wa.me/message/HIOPPN… 📧 Email: info@ignitetechnologies.in 🎯 Book Your Demo Session Today! 📘 What You’ll Learn: ✅ Introduction to Ethical Hacking ✅ Old School Learning Methodology ✅ Networking Fundamentals ✅ Reconnaissance (Footprinting, Scanning & Enumeration) ✅ System Hacking ✅ Post Exploitation & Persistence ✅ Web Server Penetration Testing ✅ Website Hacking Techniques ✅ Malware Threats & Analysis ✅ Wireless Network Security ✅ Cryptography & Steganography ✅ Sniffing Attacks ✅ Denial of Service (DoS) ✅ Evading IDS, Firewalls & Honeypots ✅ Social Engineering Techniques ✅ Mobile Platform Security 💡 Whether you're a beginner or looking to strengthen your penetration testing skills, this training is structured to provide practical knowledge aligned with real-world attack scenarios. Limited seats available. Secure yours now. #CyberSecurity #EthicalHacking #Infosec #PenetrationTesting #RedTeam #NetworkSecurity #BugBounty #CyberSecurityTraining #InformationSecurity #TechCareers
Hacking Articles tweet media
English
0
0
7
1.1K