Hacking Articles – Telegram
Hacking Articles
13.2K subscribers
680 photos
133 files
437 links
House of Pentester
Download Telegram
Linux Terminal Shortcuts
👍2
Network Protocol Dependies
HTTP Security Headers
🔥 OSCP+/CTF Exam Practice Training (Online) 🔥 – Register Now! 🚀

🔗 Register here: https://forms.gle/bowpX9TGEs41GDG99
💬 WhatsApp: https://wa.me/message/HIOPPNENLOX6F1

📧 Email: info@ignitetechnologies.in

Join IGNITE TECHNOLOGIES’ exclusive "Capture the Flag" Training Program and enhance your skills with the following modules:

🧠 Introduction
🌐 Information Gathering
🧱 Vulnerability Scanning
🔓 Windows Privilege Escalation
🐧 Linux Privilege Escalation
🛡 Client-Side Attacks
🌐 Web Application Attacks
🧬 Password Attacks
🧠 Tunneling & Pivoting
🏰 Active Directory Attacks
💣 Exploiting Public Exploits
📋 Report Writing
🔥1
10 step to cybersecurity
Software Analysis Forensic Tools
👍1
SIEM logs Types
Security and Privacy Protocols
1
Unix Cheatsheet
IDS vs HIDS vs NIDS
Cyber Resilence Categories
Bug Bounty Training Program (Online)

🔗 Register here: https://forms.gle/bowpX9TGEs41GDG99
💬 WhatsApp: https://wa.me/message/HIOPPNENLOX6F1

📧 Email: info@ignitetechnologies.in

Hurry up, get enrolled yourself with IGNITE TECHNOLOGIES’ fully exclusive Training Program “Bug Bounty.”

✔️ Table of Content
🚀 Introduction to WAPT & OWASP Top 10
🛠 Pentest Lab Setup
🔍 Information Gathering & Reconnaissance
💻 Netcat for Pentester
⚙️ Configuration Management Testing
🔐 Cryptography
🔑 Authentication
🕒 Session Management
📂 Local File Inclusion
🌐 Remote File Inclusion
📁 Path Traversal
💣 OS Command Injection
🔀 Open Redirect
📤 Unrestricted File Upload
🐚 PHP Web Shells
📝 HTML Injection
🌟 Cross-Site Scripting (XSS)
🔄 Client-Side Request Forgery
🛑 SQL Injection
📜 XXE Injection
🎁 Bonus Section
6
Windows Exploitation: mshta

Twitter: https://lnkd.in/e7yRpDpY

Today we are going to learn about different methods of HTA attack. HTA is a useful and important attack because it can bypass application whitelisting.

🛐 Introduction
🛐 Importance of HTA
🛐 Different methods
🛐 Conclusion
WPScan: WordPress Pentesting Framework

🔥 Telegram: https://news.1rj.ru/str/hackinarticles

In this article, we’ll show how to deface WordPress sites using WPScan, as most websites run on CMS platforms like WordPress.

📘 Introduction
🔎 Enumerating the WordPress Web Application
📦 Version Scanning
🎨 WordPress Themes
🔌 WordPress Plugins
👤 WordPress Usernames
🧾 All in a Single Command
💥 WordPress Exploitation
🎯 Brute Force Attack Using WPScan
🐚 Shell Upload Using Metasploit
🧨 Vulnerable Plugin Exploitation
🕵️‍♂️ Scanning Over a Proxy Server
🔐 Scanning With an HTTP Authentication Enabled
🔥1
1