Hacking Articles – Telegram
Hacking Articles
13.2K subscribers
680 photos
133 files
437 links
House of Pentester
Download Telegram
🛠️ Airgeddon – WiFi Pentest Toolkit

Airgeddon is a powerful bash noscript designed for Linux systems that provides an interactive and modular interface for WiFi security testing. It automates complex attacks and integrates several tools under one interface.

🔑 Key Features of Airgeddon
📶 Handshake Capture

🧠 PMKID Attack

🔓 Evil Twin Attack

🎭 Captive Portal Attack

💥 Deauthentication Attack

🛡️ DoS Attack Modes

🧰 Tool Integration

🔄 Multilanguage Support

🖥️ GUI-like Interface

📂 Saved Sessions
👍31
Password Cracking: SSH


SSH brute-force attacks remain one of the most prevalent initial access vectors in modern penetration testing engagements. Unlike legacy protocols, SSH’s encrypted channel presents unique challenges and opportunities for credential based attacks,

Hydra
🛠️ Metasploit
⚔️ Medusa
🚀 NetExec (nxc)
🔓 Ncrack
🎯 Patator
📜 Nmap NSE Script (ssh-brute.nse)
💥 BruteSpray
1👍1
👍1
🔥 OSCP+/CTF Exam Practice Training (Online) 🔥 – Register Now! 🚀

🔗 Register here: https://forms.gle/bowpX9TGEs41GDG99
💬 WhatsApp: https://wa.me/message/HIOPPNENLOX6F1

📧 Email: info@ignitetechnologies.in

Join IGNITE TECHNOLOGIES’ exclusive "Capture the Flag" Training Program and enhance your skills with the following modules:

🧠 Introduction
🌐 Information Gathering
🧱 Vulnerability Scanning
🔓 Windows Privilege Escalation
🐧 Linux Privilege Escalation
🛡️ Client-Side Attacks
🌐 Web Application Attacks
🧬 Password Attacks
🧠 Tunneling & Pivoting
🏰 Active Directory Attacks
💣 Exploiting Public Exploits
📋 Report Writing

#infosec #cybersecurity #cybersecuritytips #microsoft #AI #informationsecurity #CyberSec #microsoft #offensivesecurity #infosecurity #cyberattacks #security #oscp #cybersecurityawareness #bugbounty #bugbountytips
11🔥1
📱 Android Application Framework: Beginner’s Guide

Dive into the core architecture of Android with this detailed guide. Essential for developers and security researchers.

🔗 Read the full article: hackingarticles.in
4
🔐 Credential Dumping: Windows Autologon Password

Attackers often target stored AutoLogon credentials to escalate access. Learn how this technique works and how to defend against it:

Method: Extracts plaintext passwords from the Registry (HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon).

Tools Used: Mimikatz, PowerShell, or manual registry queries.

Impact: Compromises domain/logon persistence.

Mitigation: Disable AutoLogon or use LSA protection.


📖 Read the guide: hackingarticles.in
4
MSSQL for Pentester Command Execution with xp_cmdshell.pdf
4 MB
🔍 MSSQL Pentesting: Command Execution via xp_cmdshell


This guide covers practical exploitation of MSSQL Server using xp_cmdshell:

Enabling xp_cmdshell (GUI, sqsh, impactet-mssqlclient)

Reverse shell methods: .hta, netcat, Python, nxc, crackmapexec, Metasploit

PowerUPSQL for command execution


🔔 Turn on notifications for more hacking writeups!
🔥31
abusing trustworthy.pdf
2.1 MB
New Article Alert!
Title: Abusing Trustworthy Property in MSSQL
Denoscription: Introduction to Trustworthy Property:
Understand the importance of trustworthy property in MSSQL for database security.
Lab Setup: Learn to set up a lab to demonstrate trustworthy property abuse.
Abusing Trustworthy Property: Discover exploitation methods, including manual tactics and remote exploitation with PowerUpSQL and Metasploit. Practical Examples: View examples of trustworthy property abuse, including code snippets and screenshots.
2
Password Cracking: FTP

Gaining initial access through an open FTP port is a common and effective technique in penetration testing.

Hydra
🛠️ Metasploit
💣 Medusa
🧰 NetExec (nxc)
🔓 Ncrack
⚙️ Patator
📂 Nmap NSE Script (ftp-brute.nse)
🚀 BruteSpray
2
Bug Bounty Training Program (Online)

🔗 Register here: https://forms.gle/bowpX9TGEs41GDG99
💬 WhatsApp: https://wa.me/message/HIOPPNENLOX6F1

📧 Email: info@ignitetechnologies.in

Hurry up, get enrolled yourself with IGNITE TECHNOLOGIES’ fully exclusive Training Program “Bug Bounty.”

✔️ Table of Content
🚀 Introduction to WAPT & OWASP Top 10
🛠️ Pentest Lab Setup
🔍 Information Gathering & Reconnaissance
💻 Netcat for Pentester
⚙️ Configuration Management Testing
🔐 Cryptography
🔑 Authentication
🕒 Session Management
📂 Local File Inclusion
🌐 Remote File Inclusion
📁 Path Traversal
💣 OS Command Injection
🔀 Open Redirect
📤 Unrestricted File Upload
🐚 PHP Web Shells
📝 HTML Injection
🌟 Cross-Site Scripting (XSS)
🔄 Client-Side Request Forgery
🛑 SQL Injection
📜 XXE Injection
🎁 Bonus Section
3
📡 Wireless Penetration Testing Using Aircrack-ng

Master wireless security assessments with this comprehensive guide to Aircrack-ng, the essential WiFi hacking toolkit:

• Captures WiFi handshakes (monitor mode)
• Cracks WPA/WPA2 passwords (dictionary attacks)
• Analyzes network traffic (packet injection)
• Supports all major wireless adapters

🔍 Key Attacks Covered:

WEP cracking

WPA/WPA2-PSK brute force

Deauthentication attacks

📖 Full Tutorial: Read Here
2🆒2