Hacking Articles – Telegram
Hacking Articles
13.2K subscribers
680 photos
133 files
437 links
House of Pentester
Download Telegram
1
John the Ripper Cheat Sheet

🔴⚫️Full HD Image: https://github.com/Ignitetechnologies/Mindmap/blob/main/John/John%20HD.png
🔥 OSCP+/CTF Exam Practice Training (Online) 🔥 – Register Now! 🚀

🔗 Register here: https://forms.gle/bowpX9TGEs41GDG99
💬 WhatsApp: https://wa.me/message/HIOPPNENLOX6F1

📧 Email: info@ignitetechnologies.in

Join IGNITE TECHNOLOGIES’ exclusive "Capture the Flag" Training Program and enhance your skills with the following modules:

🧠 Introduction
🌐 Information Gathering
🧱 Vulnerability Scanning
🔓 Windows Privilege Escalation
🐧 Linux Privilege Escalation
🛡️ Client-Side Attacks
🌐 Web Application Attacks
🧬 Password Attacks
🧠 Tunneling & Pivoting
🏰 Active Directory Attacks
💣 Exploiting Public Exploits
📋 Report Writing
Comprehensive Guide on SSH Tunneling

Twitter: https://lnkd.in/e7yRpDpY

SSH Tunnel: Tunneling is the concept to encapsulate the network protocol to another protocol here we put into SSH, so all network communication is encrypted. Because tunneling involves repackaging the traffic data into a different form, perhaps with encryption as standard, a third use is to hide the nature of the traffic that is run through the tunnels

Dynamic SSH tunneling
Local SSH tunneling
Remote SSH tunneling
A Detailed Guide on OS Command Injection

🔥 Telegram: https://news.1rj.ru/str/hackinarticles

In this article, we’ll learn about OS Command Injection, in which an attacker is able to trigger some arbitrary system shell commands on the hosted operating system via a vulnerable web-application.

📘 Introduction to Command Injection
How Command Injection Occurs?
🔣 Metacharacters
📂 Types of Command Injection
💥 Impact of OS Command Injection
🧭 Steps to Exploit – OS Command Injection
🛠️ Manual Exploitation
📟 Basic OS Command Injection
🚫 Bypass a Blacklist Implemented
🤖 Exploitation through Automated Tools
🧪 Burp Suite
✍️ Manual
🌪️ Fuzzing
🧬 Commix
🎯 Metasploit
👁️ Blind OS Command Injection
🔍 Detection
💣 Exploitation
Bug Bounty Training Program (Online)

🔗 Register here: https://forms.gle/bowpX9TGEs41GDG99
💬 WhatsApp: https://wa.me/message/HIOPPNENLOX6F1

📧 Email: info@ignitetechnologies.in

Hurry up, get enrolled yourself with IGNITE TECHNOLOGIES’ fully exclusive Training Program “Bug Bounty.”

✔️ Table of Content
🚀 Introduction to WAPT & OWASP Top 10
🛠️ Pentest Lab Setup
🔍 Information Gathering & Reconnaissance
💻 Netcat for Pentester
⚙️ Configuration Management Testing
🔐 Cryptography
🔑 Authentication
🕒 Session Management
📂 Local File Inclusion
🌐 Remote File Inclusion
📁 Path Traversal
💣 OS Command Injection
🔀 Open Redirect
📤 Unrestricted File Upload
🐚 PHP Web Shells
📝 HTML Injection
🌟 Cross-Site Scripting (XSS)
🔄 Client-Side Request Forgery
🛑 SQL Injection
📜 XXE Injection
🎁 Bonus Section
2
Multiple Ways to Crack WordPress login

🔥 Telegram: https://news.1rj.ru/str/hackinarticles

In this article, you will be learning how to compromise a WordPress website’s credentials using different brute-force techniques.

📚 Pre-requisites
🛰️ WPScan
💥 Metasploit
🧪 Burp Suite
🛡️ How to avoid a Brute Force Attack?
1