Hacking Articles – Telegram
Hacking Articles
13.2K subscribers
680 photos
133 files
437 links
House of Pentester
Download Telegram
Hacking Articles pinned «🔐 Welcome to Hacking Articles Official! Your Ultimate Hub for Ethical Hacking & Cybersecurity 📌 Stay Updated: 🔥 Exclusive tutorials | 🛠️ Hands-on labs 💻 Blog: hackingarticles.in 🐦 Twitter: @hackinarticles 🔹 LinkedIn: Hacking Articles 🎮 Discord: Join Here…»
🚀 Boost Your Cloud Security Knowledge with This Ultimate Mindmap! 🛡️

Unlock the secrets of Cloud Security Framework with this detailed and visually stunning mindmap! Whether you're a beginner or a pro, this resource covers everything from IAM to Zero Trust Networking, DevSecOps, and more.

🔹 Key Highlights:
Governance, Risk & Compliance (GDPR, HIPAA, PCI-DSS)
Data Security (Encryption, DLP, Key Management)
Network & Application Security (WAFs, API Security, Kubernetes)
Threat Detection & Response (SIEM, SOC, Incident Response)
Best Practices (CIS Benchmarks, Secure Configurations)

📥 Download the Full Mindmap Here:
GitHub Link
🔥52
🔒 Lock Down Your Containers Like a Pro! 🚀

Dive into the world of Container Security with this epic mindmap! Whether you're battling vulnerabilities, hardening Kubernetes, or managing secrets, this guide has you covered.

🛡️ Key Tools & Concepts:
Image Scanning (Trivy, Anchore, Grype)
Runtime Protection (Falco, Sysdig, Wazuh)
K8s Security (Kube-bench, Kube-hunter, OPA)
Secrets & Access (Vault, RBAC, Secret Management)
Network & Isolation (Calico, gVisor, Kata Containers)

📥 Grab the Full Mindmap Here:
GitHub Link
🔥2
🛠️ Airgeddon – WiFi Pentest Toolkit

Airgeddon is a powerful bash noscript designed for Linux systems that provides an interactive and modular interface for WiFi security testing. It automates complex attacks and integrates several tools under one interface.

🔑 Key Features of Airgeddon
📶 Handshake Capture

🧠 PMKID Attack

🔓 Evil Twin Attack

🎭 Captive Portal Attack

💥 Deauthentication Attack

🛡️ DoS Attack Modes

🧰 Tool Integration

🔄 Multilanguage Support

🖥️ GUI-like Interface

📂 Saved Sessions
👍31
Password Cracking: SSH


SSH brute-force attacks remain one of the most prevalent initial access vectors in modern penetration testing engagements. Unlike legacy protocols, SSH’s encrypted channel presents unique challenges and opportunities for credential based attacks,

Hydra
🛠️ Metasploit
⚔️ Medusa
🚀 NetExec (nxc)
🔓 Ncrack
🎯 Patator
📜 Nmap NSE Script (ssh-brute.nse)
💥 BruteSpray
1👍1
👍1
🔥 OSCP+/CTF Exam Practice Training (Online) 🔥 – Register Now! 🚀

🔗 Register here: https://forms.gle/bowpX9TGEs41GDG99
💬 WhatsApp: https://wa.me/message/HIOPPNENLOX6F1

📧 Email: info@ignitetechnologies.in

Join IGNITE TECHNOLOGIES’ exclusive "Capture the Flag" Training Program and enhance your skills with the following modules:

🧠 Introduction
🌐 Information Gathering
🧱 Vulnerability Scanning
🔓 Windows Privilege Escalation
🐧 Linux Privilege Escalation
🛡️ Client-Side Attacks
🌐 Web Application Attacks
🧬 Password Attacks
🧠 Tunneling & Pivoting
🏰 Active Directory Attacks
💣 Exploiting Public Exploits
📋 Report Writing

#infosec #cybersecurity #cybersecuritytips #microsoft #AI #informationsecurity #CyberSec #microsoft #offensivesecurity #infosecurity #cyberattacks #security #oscp #cybersecurityawareness #bugbounty #bugbountytips
11🔥1
📱 Android Application Framework: Beginner’s Guide

Dive into the core architecture of Android with this detailed guide. Essential for developers and security researchers.

🔗 Read the full article: hackingarticles.in
4
🔐 Credential Dumping: Windows Autologon Password

Attackers often target stored AutoLogon credentials to escalate access. Learn how this technique works and how to defend against it:

Method: Extracts plaintext passwords from the Registry (HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon).

Tools Used: Mimikatz, PowerShell, or manual registry queries.

Impact: Compromises domain/logon persistence.

Mitigation: Disable AutoLogon or use LSA protection.


📖 Read the guide: hackingarticles.in
4
MSSQL for Pentester Command Execution with xp_cmdshell.pdf
4 MB
🔍 MSSQL Pentesting: Command Execution via xp_cmdshell


This guide covers practical exploitation of MSSQL Server using xp_cmdshell:

Enabling xp_cmdshell (GUI, sqsh, impactet-mssqlclient)

Reverse shell methods: .hta, netcat, Python, nxc, crackmapexec, Metasploit

PowerUPSQL for command execution


🔔 Turn on notifications for more hacking writeups!
🔥31
abusing trustworthy.pdf
2.1 MB
New Article Alert!
Title: Abusing Trustworthy Property in MSSQL
Denoscription: Introduction to Trustworthy Property:
Understand the importance of trustworthy property in MSSQL for database security.
Lab Setup: Learn to set up a lab to demonstrate trustworthy property abuse.
Abusing Trustworthy Property: Discover exploitation methods, including manual tactics and remote exploitation with PowerUpSQL and Metasploit. Practical Examples: View examples of trustworthy property abuse, including code snippets and screenshots.
2
Password Cracking: FTP

Gaining initial access through an open FTP port is a common and effective technique in penetration testing.

Hydra
🛠️ Metasploit
💣 Medusa
🧰 NetExec (nxc)
🔓 Ncrack
⚙️ Patator
📂 Nmap NSE Script (ftp-brute.nse)
🚀 BruteSpray
2