Hacking Articles – Telegram
Hacking Articles
13.2K subscribers
680 photos
133 files
437 links
House of Pentester
Download Telegram
🔐 Firewall Audit Checklist: The Ultimate Security Review

Ensure your firewall is battle-ready with this comprehensive audit guide:

Pre-Audit Prep – Docs, diagrams & version checks
Access Control – Admin roles, password policies, VPN checks
Config Review – Rule order, DMZ setup, encryption status
Monitoring – Logging, IDS, incident response
Physical & Backup – Access logs, DR plans, patch management

🔧 Critical Checks:
• Test from trusted/untrusted networks
• Verify "deny all except permitted" enforcement
• Hunt for default credentials and stale accounts
1
Bug Bounty Training Program (Online)

🔗 Register here: https://forms.gle/bowpX9TGEs41GDG99
💬 WhatsApp: https://wa.me/message/HIOPPNENLOX6F1

📧 Email: info@ignitetechnologies.in

Hurry up, get enrolled yourself with IGNITE TECHNOLOGIES’ fully exclusive Training Program “Bug Bounty.”

✔️ Table of Content
🚀 Introduction to WAPT & OWASP Top 10
🛠️ Pentest Lab Setup
🔍 Information Gathering & Reconnaissance
💻 Netcat for Pentester
⚙️ Configuration Management Testing
🔐 Cryptography
🔑 Authentication
🕒 Session Management
📂 Local File Inclusion
🌐 Remote File Inclusion
📁 Path Traversal
💣 OS Command Injection
🔀 Open Redirect
📤 Unrestricted File Upload
🐚 PHP Web Shells
📝 HTML Injection
🌟 Cross-Site Scripting (XSS)
🔄 Client-Side Request Forgery
🛑 SQL Injection
📜 XXE Injection
🎁 Bonus Section
1🔥1
🔥 CISSP Training Program (Online) 🔥 – Register Now! 🚀

🔗 Register here: https://forms.gle/bowpX9TGEs41GDG99
💬 WhatsApp: https://wa.me/message/HIOPPNENLOX6F1

📧 Email: info@ignitetechnologies.in

Join Ignite Technologies CISSP live sessions with core practicals at Lowest Price.
BOOK YOUR Seat NOW ………….


🔐 Security and Risk Management
📦 Asset Security
🏗 Security Architecture and Engineering
🌐 Communication and Network Security
🧑‍💻 Identity and Access Management (IAM)
🧪 Security Assessment and Testing
⚙️ Security Operations
💻 Software Development Security
A Detailed Guide on Log4J Penetration Testing

Twitter: https://lnkd.in/e7yRpDpY

In this article, we are going to discuss and demonstrate in our lab setup, the exploitation of the new vulnerability identified as CVE-2021-44228 affecting the java logging package, Log4J.

Log4jShell
What is log4j
What is LDAP and JNDI
LDAP and JNDI Chemistry
Log4j JNDI lookup
Normal Log4j scenario
Exploit Log4j scenario
Pentest Lab Setup
Exploiting Log4j (CVE-2021-44228)
Mitigation
👍1
A Detailed Guide on Data Exfiltration Using DNSSteal

Twitter: Link

In this article, we demonstrate how attackers stealthily exfiltrate data using DNS queries, bypassing traditional security controls.

What is DNS Exfiltration?
How DNSSteal Works
Lab Setup for DNS Tunneling
Configuring Attacker Server
Sending Data via DNS Queries
Capturing Exfiltrated Data
Detection & Mitigation Strategies
A Detailed Guide on ICS/OT Cyber Security Lab Manual

Twitter: Link

Master industrial control system security with this hands-on lab manual covering:

ICS/OT Fundamentals – Key differences from IT, critical controls
Protocol Analysis – Modbus, Wireshark captures, TCP/IP inspection
Secure Architecture – Purdue Model, IT/OT DMZ, ACL reviews
Threat Hunting – Asset registers, vulnerability scanning (Nmap/Nessus)
OSINT Techniques – Shodan, Google dorks, LinkedIn recon
Incident Response – Backdoors & Breaches (ICS OT Core Deck)