Hacking Articles – Telegram
Hacking Articles
12.8K subscribers
680 photos
133 files
437 links
House of Pentester
Download Telegram
WPScan: WordPress Pentesting Framework

Twitter: https://lnkd.in/e7yRpDpY
🔥 Telegram: https://news.1rj.ru/str/hackinarticles

In this article, we’ll try to deface such WordPress websites, with one of the most powerful WordPress vulnerability Scanner i.e WPScan.

📘 Introduction
🔎 Enumerating the WordPress Web Application
📦 Version Scanning
🎨 WordPress Themes
🔌 WordPress Plugins
👤 WordPress Usernames
🧾 All in a Single Command

💥 WordPress Exploitation
🎯 Brute Force Attack Using WPScan
🐚 Shell Upload Using Metasploit
🧨 Vulnerable Plugin Exploitation

🕵️ Scanning Over a Proxy Server
🔐 Scanning With an HTTP Authentication Enabled
2
Bug Bounty Training Program (Online)

🔗 Register here: https://forms.gle/bowpX9TGEs41GDG99
💬 WhatsApp: https://wa.me/message/HIOPPNENLOX6F1

📧 Email: info@ignitetechnologies.in

Hurry up, get enrolled yourself with IGNITE TECHNOLOGIES’ fully exclusive Training Program “Bug Bounty.”

✔️ Table of Content
🚀 Introduction to WAPT & OWASP Top 10
🛠️ Pentest Lab Setup
🔍 Information Gathering & Reconnaissance
💻 Netcat for Pentester
⚙️ Configuration Management Testing
🔐 Cryptography
🔑 Authentication
🕒 Session Management
📂 Local File Inclusion
🌐 Remote File Inclusion
📁 Path Traversal
💣 OS Command Injection
🔀 Open Redirect
📤 Unrestricted File Upload
🐚 PHP Web Shells
📝 HTML Injection
🌟 Cross-Site Scripting (XSS)
🔄 Client-Side Request Forgery
🛑 SQL Injection
📜 XXE Injection
🎁 Bonus Section
1
Unix Cheatsheet
4
When and Why SSL
🔥2
URL structure
2
🔒 Infosec Characters - Desi Cybersecurity Edition

🛡️ Firewall
The Protective Father – "No entry without approval!"

👃 IDS/IPS
The Suspicious Buaji – "Sniffing out shady vibes since forever!"

🔍 Vulnerability Scanner
The Perfectionist Planner – "Finds every crack before the baraat arrives!"

🍯 Honeypot
The Decoy Bride – "Come at me, hackers!"

🚕 VPN
The Shortcut Rickshaw Wala – "Changes your route, hides your tracks!"

📢 SIEM
The Chuchi Aunty – "Watches silently, alerts loudly!"

🤖 SOAR
The Wedding Coordinator – "Automates chaos into action!"

🔐 Data Encryption
The Cunning Bhabhi – "Knows all secrets but keeps them locked!"

👊 EDR
The Overprotective Bhaiyya – "Punches malware before it blinks!"

👀 DLP
The Gold-Watching Mami – "Stops data thieves like a hawk!"

📱 MFA
The Extra-Cautious Nani – "Needs OTP, Aadhaar, and your blood group!"

🔗 Follow for more: @hackinarticles
2
🚀 Active Directory Penetration Training (Online) – Register Now! 🚀

🔗 Register here: https://forms.gle/bowpX9TGEs41GDG99
💬 WhatsApp: https://wa.me/message/HIOPPNENLOX6F1

📧 Email: info@ignitetechnologies.in

Limited slots available! Hurry up to secure your spot in this exclusive training program offered by Ignite Technologies.

✔️ Comprehensive Table of Contents:
🔍 Initial Active Directory Exploitation
🔎 Active Directory Post-Enumeration
🔐 Abusing Kerberos
🧰 Advanced Credential Dumping Attacks
📈 Privilege Escalation Techniques
🔄 Persistence Methods
🔀 Lateral Movement Strategies
🛡️ DACL Abuse (New)
🏴 ADCS Attacks (New)
💎 Saphire and Diamond Ticket Attacks (New)
🎁 Bonus Sessions

#infosec #cybersecurity #cybersecuritytips #pentesting #redteam #informationsecurity #CyberSec #networking #offensivesecurity #infosecurity #cyberattacks #security #oscp #cybersecurityawareness #bugbounty #bugbountytips
Linux-vs-Ubuntu
Linux vs FreeBSD info
IPS vs IDS info
ADCS ESC14 – Write access on altSecurityIdentities

🔥 Telegram: https://news.1rj.ru/str/hackinarticles
Twitter: https://x.com/hackinarticles

ESC14 targets weak certificate mapping in Active Directory, exploiting the altSecurityIdentities attribute to allow attackers to spoof Subject CN or Issuer DN fields.

📘 Overview of the ESC14 Attack
⚙️ Working of ESC14
📋 Prerequisites
🧪 Lab Setup

🎯 Enumeration & Exploitation
🔓 Abusing Weak Explicit Certificate Mappings via altSecurityIdentities

🧠 Post Exploitation
🖥️ Full SYSTEM Shell via Evil-WinRM

🛡️ Mitigation
🔥 OSCP+/CTF Exam Practice Training (Online) 🔥 – Register Now! 🚀

🔗 Register here: https://forms.gle/bowpX9TGEs41GDG99
💬 WhatsApp: https://wa.me/message/HIOPPNENLOX6F1

📧 Email: info@ignitetechnologies.in

Join IGNITE TECHNOLOGIES’ exclusive "Capture the Flag" Training Program and enhance your skills with the following modules:

🧠 Introduction
🌐 Information Gathering
🧱 Vulnerability Scanning
🔓 Windows Privilege Escalation
🐧 Linux Privilege Escalation
🛡️ Client-Side Attacks
🌐 Web Application Attacks
🧬 Password Attacks
🧠 Tunneling & Pivoting
🏰 Active Directory Attacks
💣 Exploiting Public Exploits
📋 Report Writing

#cybersecurity #cyber #security #hacking #hacker #infosec #cybercrime #tech #technology #cyberattack #datasecurity #malware #ethicalhacking #phishing #cloudsecurity #oscp
3
DNS Record Types