Hacking Articles – Telegram
Hacking Articles
12.8K subscribers
680 photos
133 files
437 links
House of Pentester
Download Telegram
Network Trafic Analysis Tools
Red Teaming vs Pentesting
SOC Analysis
🚀 The Ultimate DevSecOps Playbook for 2025 AI, ML, and Beyond

Follow us on Twitter

🔑 Track These KPIs
Deployment Frequency
MTTR
Change Failure Rate
Security Coverage

Top Tools
GitGuardian | Snyk | Trivy
GitHub Copilot | Darktrace

🤖 AI Advantage
Auto-threat detection
Smart incident response

📈 Maturity Journey
Ad-hoc → AI-Optimized

💡 Pro Tip: Bake security into CI/CD
AWS: IAM CreateAccessKey Privilege Escalation

🔥 Telegram: https://news.1rj.ru/str/hackinarticles
Twitter: https://x.com/hackinarticles

In this lab, we will show how a low-privileged IAM user can misuse the iam:CreateAccessKey permission where user is allowed to create access keys for another IAM user who can take on elevated roles, leading to privilege escalation.

📘 About iam:CreateAccessKey
🧪 Lab Setup and Prerequisite

🏗️ Part 1: IAM Lab Setup
🔐 Creating High Privileged IAM User
🔒 Creating Low Privileged IAM User

🕵️ Part 2: Enumeration and Exploitation
📋 Prerequisite for Pentest
🖥️ Configuring AWS CLI With Low Privileged User Credentials
👥 Enumerating IAM Users with AWS CLI
💥 IAM CreateAccessKey Exploitation

📊 Analysis
Recommendations
📌 Conclusion
2
🔥 OSCP+/CTF Exam Practice Training (Online) 🔥 – Register Now! 🚀

🔗 Register here: https://forms.gle/bowpX9TGEs41GDG99
💬 WhatsApp: https://wa.me/message/HIOPPNENLOX6F1

📧 Email: info@ignitetechnologies.in

Join IGNITE TECHNOLOGIES’ exclusive "Capture the Flag" Training Program and enhance your skills with the following modules:

🧠 Introduction
🌐 Information Gathering
🧱 Vulnerability Scanning
🔓 Windows Privilege Escalation
🐧 Linux Privilege Escalation
🛡️ Client-Side Attacks
🌐 Web Application Attacks
🧬 Password Attacks
🧠 Tunneling & Pivoting
🏰 Active Directory Attacks
💣 Exploiting Public Exploits
📋 Report Writing
Business Name OSINT
3
Human OSINT Subject
2
Twitter OSINT
2
WPScan: WordPress Pentesting Framework

Twitter: https://lnkd.in/e7yRpDpY
🔥 Telegram: https://news.1rj.ru/str/hackinarticles

In this article, we’ll try to deface such WordPress websites, with one of the most powerful WordPress vulnerability Scanner i.e WPScan.

📘 Introduction
🔎 Enumerating the WordPress Web Application
📦 Version Scanning
🎨 WordPress Themes
🔌 WordPress Plugins
👤 WordPress Usernames
🧾 All in a Single Command

💥 WordPress Exploitation
🎯 Brute Force Attack Using WPScan
🐚 Shell Upload Using Metasploit
🧨 Vulnerable Plugin Exploitation

🕵️ Scanning Over a Proxy Server
🔐 Scanning With an HTTP Authentication Enabled
2
Bug Bounty Training Program (Online)

🔗 Register here: https://forms.gle/bowpX9TGEs41GDG99
💬 WhatsApp: https://wa.me/message/HIOPPNENLOX6F1

📧 Email: info@ignitetechnologies.in

Hurry up, get enrolled yourself with IGNITE TECHNOLOGIES’ fully exclusive Training Program “Bug Bounty.”

✔️ Table of Content
🚀 Introduction to WAPT & OWASP Top 10
🛠️ Pentest Lab Setup
🔍 Information Gathering & Reconnaissance
💻 Netcat for Pentester
⚙️ Configuration Management Testing
🔐 Cryptography
🔑 Authentication
🕒 Session Management
📂 Local File Inclusion
🌐 Remote File Inclusion
📁 Path Traversal
💣 OS Command Injection
🔀 Open Redirect
📤 Unrestricted File Upload
🐚 PHP Web Shells
📝 HTML Injection
🌟 Cross-Site Scripting (XSS)
🔄 Client-Side Request Forgery
🛑 SQL Injection
📜 XXE Injection
🎁 Bonus Section
1
Unix Cheatsheet
4
When and Why SSL
🔥2
URL structure
2