Hacking Articles – Telegram
Hacking Articles
13.2K subscribers
680 photos
133 files
437 links
House of Pentester
Download Telegram
Cyber Resilence Categories
Bug Bounty Training Program (Online)

🔗 Register here: https://forms.gle/bowpX9TGEs41GDG99
💬 WhatsApp: https://wa.me/message/HIOPPNENLOX6F1

📧 Email: info@ignitetechnologies.in

Hurry up, get enrolled yourself with IGNITE TECHNOLOGIES’ fully exclusive Training Program “Bug Bounty.”

✔️ Table of Content
🚀 Introduction to WAPT & OWASP Top 10
🛠 Pentest Lab Setup
🔍 Information Gathering & Reconnaissance
💻 Netcat for Pentester
⚙️ Configuration Management Testing
🔐 Cryptography
🔑 Authentication
🕒 Session Management
📂 Local File Inclusion
🌐 Remote File Inclusion
📁 Path Traversal
💣 OS Command Injection
🔀 Open Redirect
📤 Unrestricted File Upload
🐚 PHP Web Shells
📝 HTML Injection
🌟 Cross-Site Scripting (XSS)
🔄 Client-Side Request Forgery
🛑 SQL Injection
📜 XXE Injection
🎁 Bonus Section
6
Windows Exploitation: mshta

Twitter: https://lnkd.in/e7yRpDpY

Today we are going to learn about different methods of HTA attack. HTA is a useful and important attack because it can bypass application whitelisting.

🛐 Introduction
🛐 Importance of HTA
🛐 Different methods
🛐 Conclusion
WPScan: WordPress Pentesting Framework

🔥 Telegram: https://news.1rj.ru/str/hackinarticles

In this article, we’ll show how to deface WordPress sites using WPScan, as most websites run on CMS platforms like WordPress.

📘 Introduction
🔎 Enumerating the WordPress Web Application
📦 Version Scanning
🎨 WordPress Themes
🔌 WordPress Plugins
👤 WordPress Usernames
🧾 All in a Single Command
💥 WordPress Exploitation
🎯 Brute Force Attack Using WPScan
🐚 Shell Upload Using Metasploit
🧨 Vulnerable Plugin Exploitation
🕵️‍♂️ Scanning Over a Proxy Server
🔐 Scanning With an HTTP Authentication Enabled
🔥1
1
John the Ripper Cheat Sheet

🔴⚫️Full HD Image: https://github.com/Ignitetechnologies/Mindmap/blob/main/John/John%20HD.png
🔥 OSCP+/CTF Exam Practice Training (Online) 🔥 – Register Now! 🚀

🔗 Register here: https://forms.gle/bowpX9TGEs41GDG99
💬 WhatsApp: https://wa.me/message/HIOPPNENLOX6F1

📧 Email: info@ignitetechnologies.in

Join IGNITE TECHNOLOGIES’ exclusive "Capture the Flag" Training Program and enhance your skills with the following modules:

🧠 Introduction
🌐 Information Gathering
🧱 Vulnerability Scanning
🔓 Windows Privilege Escalation
🐧 Linux Privilege Escalation
🛡️ Client-Side Attacks
🌐 Web Application Attacks
🧬 Password Attacks
🧠 Tunneling & Pivoting
🏰 Active Directory Attacks
💣 Exploiting Public Exploits
📋 Report Writing
Comprehensive Guide on SSH Tunneling

Twitter: https://lnkd.in/e7yRpDpY

SSH Tunnel: Tunneling is the concept to encapsulate the network protocol to another protocol here we put into SSH, so all network communication is encrypted. Because tunneling involves repackaging the traffic data into a different form, perhaps with encryption as standard, a third use is to hide the nature of the traffic that is run through the tunnels

Dynamic SSH tunneling
Local SSH tunneling
Remote SSH tunneling
A Detailed Guide on OS Command Injection

🔥 Telegram: https://news.1rj.ru/str/hackinarticles

In this article, we’ll learn about OS Command Injection, in which an attacker is able to trigger some arbitrary system shell commands on the hosted operating system via a vulnerable web-application.

📘 Introduction to Command Injection
How Command Injection Occurs?
🔣 Metacharacters
📂 Types of Command Injection
💥 Impact of OS Command Injection
🧭 Steps to Exploit – OS Command Injection
🛠️ Manual Exploitation
📟 Basic OS Command Injection
🚫 Bypass a Blacklist Implemented
🤖 Exploitation through Automated Tools
🧪 Burp Suite
✍️ Manual
🌪️ Fuzzing
🧬 Commix
🎯 Metasploit
👁️ Blind OS Command Injection
🔍 Detection
💣 Exploitation