Hacking Articles – Telegram
Hacking Articles
13.2K subscribers
680 photos
133 files
437 links
House of Pentester
Download Telegram
A Detailed Guide on OS Command Injection

🔥 Telegram: https://news.1rj.ru/str/hackinarticles

In this article, we’ll learn about OS Command Injection, in which an attacker is able to trigger some arbitrary system shell commands on the hosted operating system via a vulnerable web-application.

📘 Introduction to Command Injection
How Command Injection Occurs?
🔣 Metacharacters
📂 Types of Command Injection
💥 Impact of OS Command Injection
🧭 Steps to Exploit – OS Command Injection
🛠️ Manual Exploitation
📟 Basic OS Command Injection
🚫 Bypass a Blacklist Implemented
🤖 Exploitation through Automated Tools
🧪 Burp Suite
✍️ Manual
🌪️ Fuzzing
🧬 Commix
🎯 Metasploit
👁️ Blind OS Command Injection
🔍 Detection
💣 Exploitation
Bug Bounty Training Program (Online)

🔗 Register here: https://forms.gle/bowpX9TGEs41GDG99
💬 WhatsApp: https://wa.me/message/HIOPPNENLOX6F1

📧 Email: info@ignitetechnologies.in

Hurry up, get enrolled yourself with IGNITE TECHNOLOGIES’ fully exclusive Training Program “Bug Bounty.”

✔️ Table of Content
🚀 Introduction to WAPT & OWASP Top 10
🛠️ Pentest Lab Setup
🔍 Information Gathering & Reconnaissance
💻 Netcat for Pentester
⚙️ Configuration Management Testing
🔐 Cryptography
🔑 Authentication
🕒 Session Management
📂 Local File Inclusion
🌐 Remote File Inclusion
📁 Path Traversal
💣 OS Command Injection
🔀 Open Redirect
📤 Unrestricted File Upload
🐚 PHP Web Shells
📝 HTML Injection
🌟 Cross-Site Scripting (XSS)
🔄 Client-Side Request Forgery
🛑 SQL Injection
📜 XXE Injection
🎁 Bonus Section
2
Multiple Ways to Crack WordPress login

🔥 Telegram: https://news.1rj.ru/str/hackinarticles

In this article, you will be learning how to compromise a WordPress website’s credentials using different brute-force techniques.

📚 Pre-requisites
🛰️ WPScan
💥 Metasploit
🧪 Burp Suite
🛡️ How to avoid a Brute Force Attack?
1
Burp Suite for Pentester: Web Scanner & Crawler

Twitter: https://lnkd.in/e7yRpDpY
🔥Telegram: https://news.1rj.ru/str/hackinarticles

In this article, we’ll discuss how you can identify hidden web pages or determine the existing vulnerabilities in a web application. To do this, we will use one of the best intercepting tools – “Burp Suite”.

🕷️ The Burp’s Crawler
What is Crawler?
⚙️ Crawl with Default Configurations
🛠️ Customizing the Crawler

🛡️ Vulnerability Scanning over Burp Suite
🔍 Auditing with Default Configurations
🎛️ Defining Audit Options

🔄 Crawling & Scanning with an Advanced Scenario
🗑️ Deleting the Defined Tasks
Mitre Collection
Mitre Command and Control
Mitre Credential Access
🚀 Active Directory Exploitation Training (Online) – Register Now! 🚀

🔗 Register here: https://forms.gle/bowpX9TGEs41GDG99
💬 WhatsApp: https://wa.me/message/HIOPPNENLOX6F1

📧 Email: info@ignitetechnologies.in

Limited slots available! Hurry up to secure your spot in this exclusive training program offered by Ignite Technologies.

✔️ Comprehensive Table of Contents:
🔍 Initial Active Directory Exploitation
🔎 Active Directory Post-Enumeration
🔐 Abusing Kerberos
🧰 Advanced Credential Dumping Attacks
📈 Privilege Escalation Techniques
🔄 Persistence Methods
🔀 Lateral Movement Strategies
🛡️ DACL Abuse (New)
🏴 ADCS Attacks (New)
💎 Saphire and Diamond Ticket Attacks (New)
🎁 Bonus Sessions