Hacking Articles – Telegram
Hacking Articles
13.2K subscribers
680 photos
133 files
437 links
House of Pentester
Download Telegram
Mitre Credential Access
🚀 Active Directory Exploitation Training (Online) – Register Now! 🚀

🔗 Register here: https://forms.gle/bowpX9TGEs41GDG99
💬 WhatsApp: https://wa.me/message/HIOPPNENLOX6F1

📧 Email: info@ignitetechnologies.in

Limited slots available! Hurry up to secure your spot in this exclusive training program offered by Ignite Technologies.

✔️ Comprehensive Table of Contents:
🔍 Initial Active Directory Exploitation
🔎 Active Directory Post-Enumeration
🔐 Abusing Kerberos
🧰 Advanced Credential Dumping Attacks
📈 Privilege Escalation Techniques
🔄 Persistence Methods
🔀 Lateral Movement Strategies
🛡️ DACL Abuse (New)
🏴 ADCS Attacks (New)
💎 Saphire and Diamond Ticket Attacks (New)
🎁 Bonus Sessions
Abusing AD-DACL: WriteDacl

Twitter: https://lnkd.in/e7yRpDpY
🔥Telegram: https://news.1rj.ru/str/hackinarticles

In this post, we will explore the exploitation of Discretionary Access Control Lists (DACL) using the WriteDacl permission in Active Directory environments.

🧪 Lab Setup – User Owns WriteDacl Permission on Another User
⚔️ Exploitation Phase I – User Owns WriteDacl Permission on Another User
🕵️ BloodHound – Hunting for Weak Permission

🔧 Method for Exploitation:
  📜 Granting Full Control
  🔥 Kerberoasting (T1558.003) or
  🔑 Change Password (T1110.001)

🐧 Linux-Based Tools
🧰 Impacket Tool – Granting Full Control
🐍 Python Script (TargetedKerberoast)
🔐 Linux – Change Password
📡 Net RPC (Samba)
💉 BloodyAD

🪟 Windows PowerShell (PowerView)
🧾 Granting Full Control
🦊 Kerberoasting
🔁 Change Password

🧪 Lab Setup – User Owns WriteDacl Permission on the Domain Admin Group
⚔️ Exploitation Phase II – User Owns WriteDacl Permission on a Group
🕵️ BloodHound – Hunting for Weak Permission

🔧 Method for Exploitation:
  📜 Granting Full Control
  👥 Account Manipulation (T1098)

🐧 Linux-Based Tools
🧰 Impacket Tool – Granting Full Control
Linux – Adding Member to the Group
📡 Net RPC (Samba)
💉 BloodyAD

🪟 Windows-Based Tools
🧾 PowerView – Granting Full Control
Net Command – Adding Member to Group
2
Comprehensive Guide on Autopsy Tool (Windows)

Twitter: https://lnkd.in/e7yRpDpY

Autopsy is an open-source tool that is used to perform forensic operations on the disk image of the evidence. The forensic investigation that is carried out on the disk image is displayed here.

File Type
MIME-type
Deleted Files
MB File size
Results
Extracted Content
Keyword Hits
Timeline
Discovery
Images/Videos
Add File Tags
Generate Reports
1
20 Chrome Extensions
3
Linuxverse
GitGuardian 2025 Report

Twitter: Link

🔐 23.8M new secrets leaked (+25% YoY)
🔄 58% generic secrets (passwords, DB strings)
🏢 35% private repos leak (8x public repos)
🐳 100K+ valid keys in Docker images
🤖 40% more leaks with Copilot
🚨 70% of 2022 leaks still active
🔥 CISSP Training Program (Online) 🔥 – Register Now! 🚀

🔗 Register here: https://forms.gle/bowpX9TGEs41GDG99
💬 WhatsApp: https://wa.me/message/HIOPPNENLOX6F1

📧 Email: info@ignitetechnologies.in

Join Ignite Technologies CISSP live sessions with core practicals at Lowest Price.
BOOK YOUR Seat NOW ………….

🔐 Security and Risk Management
📦 Asset Security
🏗️ Security Architecture and Engineering
🌐 Communication and Network Security
🧑‍💻 Identity and Access Management (IAM)
🧪 Security Assessment and Testing
⚙️ Security Operations
💻 Software Development Security
1
A Detailed Guide on Medusa

Twitter: https://lnkd.in/e7yRpDpY

Hi Pentesters! Let’s learn about a different tool Medusa, which is intended to be a speedy, parallel and modular, login brute force.

🔶 Features of Medusa
🔶Password Cracking for specific Username
🔶Username Cracking for specific Password
🔶To crack login credentials
🔶Brute Force on Multiple Host
🔶To attack a specific port rather than the default
🔶Additional password checks (Null/Same)
🔶To Save Logs in a File
🔶Stop on Success.
🔶To suppress start-up Banner
🔶Verbose Mode
🔶Error Debug level
🔶Using Combo Entries
🔶Concurrent testing on multiple logins
🔶Display Module Usage Information
👍1
Wordlists for Pentester

 Twitter: https://lnkd.in/e7yRpDpY

A Pentester is as good as their tools and when it comes to cracking the password, stressing authentication panels or even a simple directory Bruteforce it all drills down to the wordlists that you use. Today we are going to understand word lists.

🔳 CeWL
🔳Crunch
🔳Cupp
🔳Pydictor
🔳Bopscrk
🔳BEWCor
🔳Dymerge
🔳Mentalist
Docker Components
3