Hacking Articles – Telegram
Hacking Articles
13.2K subscribers
680 photos
133 files
437 links
House of Pentester
Download Telegram
A Detailed Guide on Log4J Penetration Testing

Twitter: https://lnkd.in/e7yRpDpY

In this article, we are going to discuss and demonstrate in our lab setup, the exploitation of the new vulnerability identified as CVE-2021-44228 affecting the java logging package, Log4J.

Log4jShell
What is log4j
What is LDAP and JNDI
LDAP and JNDI Chemistry
Log4j JNDI lookup
Normal Log4j scenario
Exploit Log4j scenario
Pentest Lab Setup
Exploiting Log4j (CVE-2021-44228)
Mitigation
👍1
A Detailed Guide on Data Exfiltration Using DNSSteal

Twitter: Link

In this article, we demonstrate how attackers stealthily exfiltrate data using DNS queries, bypassing traditional security controls.

What is DNS Exfiltration?
How DNSSteal Works
Lab Setup for DNS Tunneling
Configuring Attacker Server
Sending Data via DNS Queries
Capturing Exfiltrated Data
Detection & Mitigation Strategies
A Detailed Guide on ICS/OT Cyber Security Lab Manual

Twitter: Link

Master industrial control system security with this hands-on lab manual covering:

ICS/OT Fundamentals – Key differences from IT, critical controls
Protocol Analysis – Modbus, Wireshark captures, TCP/IP inspection
Secure Architecture – Purdue Model, IT/OT DMZ, ACL reviews
Threat Hunting – Asset registers, vulnerability scanning (Nmap/Nessus)
OSINT Techniques – Shodan, Google dorks, LinkedIn recon
Incident Response – Backdoors & Breaches (ICS OT Core Deck)
🚀 Join Ignite Technologies' Red Team Operation Course Online! 🚀

🔗 Register here: https://forms.gle/bowpX9TGEs41GDG99
💬 WhatsApp: https://wa.me/message/HIOPPNENLOX6F1

📧 Email: info@ignitetechnologies.in

Enroll now in our exclusive "Red Teaming" Training Program and explore the following modules:

Introduction to Red Team
📩 Initial Access & Delivery
⚙️ Weaponization
🌐 Command and Control (C2)
🔼 Escalate Privileges
🔐 Credential Dumping
🖧 Active Directory Exploitation
🔀 Lateral Movement
🔄 Persistence
📤 Data Exfiltration
🛡️ Defense Evasion
📝 Reporting


Join us for a comprehensive learning experience! 🔒💻🔍
Tomcat Penetration Testing

Twitter: https://lnkd.in/e7yRpDpY

In this article, we are going to setup the Tomcat server on the ubuntu machine and exploit the file upload vulnerability. Following are the machines:

🏀 Lab Setup
🏀Installation
🏀Configuration
🏀Enumeration
🏀Exploitation using Metasploit Framework
🏀Exploiting Manually (Reverse shell)
🏀Exploiting Manually (Web shell)
🏀Conclusion
Comprehensive Guide on Ncrack – A Brute Forcing Tool

In this article, we will be exploring the topic of network authentication using Ncrack. Security professionals depend on Ncrack while auditing their clients.

Twitter: https://lnkd.in/e7yRpDpY

🎱 Introduction to Ncrack
🎱Authentication Phase
🎱Misc Phase
🎱Output Format
🎱Timing and Performance
🎱Target Specification
A Detailed Guide on Linux Incident Response

Twitter: Share this guide

Master Linux forensic investigation with this SANS-certified methodology covering:

Filesystem Timelines - M/A/C/B timestamps analysis
Memory Acquisition - AVML vs LiME vs /proc techniques
Threat Hunting - Rootkit detection (chkrootkit/rkhunter)
Log Analysis - auth.log, journalctl, and firewall logs
Persistence Mechanisms - Cron jobs, .bashrc hooks, LKMs
Disk Forensics - EWF/VMDK mounting with ewfmount/guestmount