Hacking Articles – Telegram
Hacking Articles
13.2K subscribers
680 photos
133 files
437 links
House of Pentester
Download Telegram
Comprehensive Guide on XXE Injection

🔥 Telegram: https://news.1rj.ru/str/hackinarticles

today in this article, we will learn how an attacker can use this vulnerability to gain information and try to defame web-application.

📘 Introduction to XML
💉 Introduction to XXE Injection
⚠️ Impacts
🌐 XXE for SSRF
📂 Local File
🌍 Remote File
💣 XXE Billion Laugh Attack
📤 XXE using File Upload
🖥️ Remote Code Execution
🧪 XSS via XXE
🔧 JSON and Content Manipulation
👁️‍🗨️ Blind XXE
🛡️ Mitigation Steps
1
GenAI Red Teaming Guide

Twitter: Link
Key focus areas:

🔍 Model Risks

Prompt injection, data leaks, hallucinations

🛠 System Weaknesses

API abuse, RAG poisoning, jailbreaks

Runtime Threats

Social engineering, agent hijacking

🔧 Top Tools

PyRIT, Garak, Promptfoo
3🔥1
API Penetration Testing Training (Online)

🔗 Register here: https://forms.gle/bowpX9TGEs41GDG99
💬 WhatsApp: https://wa.me/message/HIOPPNENLOX6F1

📧 Email: info@ignitetechnologies.in

Hurry up, get enrolled yourself with Ignite Technologies’ fully exclusive Training Program "API Penetration Testing Training."

✔️ Table of Content

📘 Course Introduction
🔍 How API works with Web application
⚖️ Types of APIs and their advantages/disadvantages
🔎 Analysing HTTP request and response headers
🛡️ API Hacking methodologies
📄 Enumerate web pages and analyse functionalities
🕵️ API passive reconnaissance Strategies
🚀 API active reconnaissance (Kite runner)
🔧 Introduction to POSTMAN
🔍 Testing for Excessive data exposure
📂 Directory indexing / brute force
🔑 Password mutation
🎯 Password spray attacks against web application
🛡️ Introduction to JSON Web Token
🕵️ Hunting for JWT authentication vulnerabilities
💣 Exploiting JWT unverified signature
🔓 Cracking JWT secret keys
🚫 Bypass JWT removing signature
💉 Exploit jku header injection
🔧 Exploit KID in JSON web tokens
🔐 Attacking 0Auth 2.0
📊 Introduction to OWASP TOP 10 API
⚔️ Hunting and exploiting XXS in API
🕵️ Testing for the ReDOS attack in the API web application
💥 Exploiting XML vulnerabilities
🔧 WordPress XML-RPC attack
🌐 Exploiting WSDL/SOAP to RFI
🤖 API Automated Vulnerability scanning
💉 Testing SQL/NoSQL Injection in an API
🔓 Exploiting object-level access control
🔧 Exploiting Function level access control
📡 Testing in-band SSRF vulnerabilities in an API
🌍 Testing out-band SSRF vulnerabilities in an API
⚙️ Testing OS Command Injection
Exploiting Java deserialization vulnerabilities
🗂️ Testing for improper assets management
📦 Testing for Mass assignment vulnerabilities
🚧 Bypass filter, space, and blacklisted characters
🔐 Bypass Captcha and MFA
📋 Remediations and Reporting
1
Windows PowerShell Networking Guide
1
Top Cloud Threats Coverage
😐1
🚨 Upcoming Webinar Alert – Advance Your Cybersecurity Career! 🛡

Are you ready to take the next step in your cybersecurity journey?

Join us for an exclusive CISSP Webinar where industry experts will guide you through:

What it takes to become CISSP certified
Key domains of the (ISC)² Common Body of Knowledge (CBK)
Proven strategies to pass the CISSP exam
Career opportunities unlocked by CISSP certification

📅 Date: 21 June 2025
🕒 Time: 06:00 PM - 07:30 PM IST
Duration: 90 Mins (60 min walkthrough + 30 min Q&A)
📍 Location: Online

Whether you're preparing for the CISSP exam or simply exploring the certification, this session will provide valuable insights and practical advice.

💡 Don’t miss the chance to ask your questions live!

🔗 Join Us on WhatsApp to get the webinar link: https://chat.whatsapp.com/Da2fPnvXrGt5SvC6rpEtwm
🚀 Active Directory Exploitation Training (Online) – Register Now! 🚀

🔗 Register here: https://forms.gle/bowpX9TGEs41GDG99
💬 WhatsApp: https://wa.me/message/HIOPPNENLOX6F1

📧 Email: info@ignitetechnologies.in

Limited slots available! Hurry up to secure your spot in this exclusive training program offered by Ignite Technologies.

✔️ Comprehensive Table of Contents:
🔍 Initial Active Directory Exploitation
🔎 Active Directory Post-Enumeration
🔐 Abusing Kerberos
🧰 Advanced Credential Dumping Attacks
📈 Privilege Escalation Techniques
🔄 Persistence Methods
🔀 Lateral Movement Strategies
🛡 DACL Abuse (New)
🏴 ADCS Attacks (New)
💎 Saphire and Diamond Ticket Attacks (New)
🎁 Bonus Sessions
2
Firewall Lab Setup : FortiGate

🔥 Telegram: https://news.1rj.ru/str/hackinarticles

In the computing language, a firewall is a security software or hardware that can monitor and control network traffic, both incoming and outgoing...

📋 Prerequisites
🧱 What is a Firewall
⬇️ Download FortiGate Virtual Firewall
🔌 Configure Virtual Network Interfaces for FortiGate
💿 Deployment of FortiGate VM Image in VMware
⚙️ Configuring the Management Interface
🌐 Accessing FortiGate Firewall GUI
🖱️ GUI Demonstration
📊 Dashboard Demonstration