Hacking Articles – Telegram
Hacking Articles
12.8K subscribers
680 photos
133 files
437 links
House of Pentester
Download Telegram
Linux-vs-Ubuntu
Linux vs FreeBSD info
IPS vs IDS info
ADCS ESC14 – Write access on altSecurityIdentities

🔥 Telegram: https://news.1rj.ru/str/hackinarticles
Twitter: https://x.com/hackinarticles

ESC14 targets weak certificate mapping in Active Directory, exploiting the altSecurityIdentities attribute to allow attackers to spoof Subject CN or Issuer DN fields.

📘 Overview of the ESC14 Attack
⚙️ Working of ESC14
📋 Prerequisites
🧪 Lab Setup

🎯 Enumeration & Exploitation
🔓 Abusing Weak Explicit Certificate Mappings via altSecurityIdentities

🧠 Post Exploitation
🖥️ Full SYSTEM Shell via Evil-WinRM

🛡️ Mitigation
🔥 OSCP+/CTF Exam Practice Training (Online) 🔥 – Register Now! 🚀

🔗 Register here: https://forms.gle/bowpX9TGEs41GDG99
💬 WhatsApp: https://wa.me/message/HIOPPNENLOX6F1

📧 Email: info@ignitetechnologies.in

Join IGNITE TECHNOLOGIES’ exclusive "Capture the Flag" Training Program and enhance your skills with the following modules:

🧠 Introduction
🌐 Information Gathering
🧱 Vulnerability Scanning
🔓 Windows Privilege Escalation
🐧 Linux Privilege Escalation
🛡️ Client-Side Attacks
🌐 Web Application Attacks
🧬 Password Attacks
🧠 Tunneling & Pivoting
🏰 Active Directory Attacks
💣 Exploiting Public Exploits
📋 Report Writing

#cybersecurity #cyber #security #hacking #hacker #infosec #cybercrime #tech #technology #cyberattack #datasecurity #malware #ethicalhacking #phishing #cloudsecurity #oscp
3
DNS Record Types
Git Cheatsheet for Developers and DevOps Engineer
3
Linux Architecture
4
Linux Boot Process
2
Burp Suite for Pentester: Burp Collaborator

Twitter: https://lnkd.in/e7yRpDpY
🔥Telegram: https://news.1rj.ru/str/hackinarticles

In this article of the series of Burp Suite for Pentester, you’ll learn how to detect out-of-band or blind vulnerabilities using one of the most amazing features of Burp Suite, i.e., Burp Collaborator.

📘 Introduction to Burp Collaborator
🕵️ Detecting Vulnerabilities with Collaborator Client
💣 Blind Remote Command Execution
🧪 Cross-Site Scripting Detection
👁️‍🗨️ Blind XXE (XML External Entity)
🌐 Server-Side Request Forgery (SSRF)
🎯 Fuzzing for SSRF Detection
🚀 Active Directory Penetration Training (Online) – Register Now! 🚀

🔗 Register here: https://forms.gle/bowpX9TGEs41GDG99
💬 WhatsApp: https://wa.me/message/HIOPPNENLOX6F1

📧 Email: info@ignitetechnologies.in

Limited slots available! Hurry up to secure your spot in this exclusive training program offered by Ignite Technologies.

✔️ Comprehensive Table of Contents:
🔍 Initial Active Directory Exploitation
🔎 Active Directory Post-Enumeration
🔐 Abusing Kerberos
🧰 Advanced Credential Dumping Attacks
📈 Privilege Escalation Techniques
🔄 Persistence Methods
🔀 Lateral Movement Strategies
🛡️ DACL Abuse (New)
🏴 ADCS Attacks (New)
💎 Saphire and Diamond Ticket Attacks (New)
🎁 Bonus Sessions

#infosec #cybersecurity #cybersecuritytips #pentesting #redteam #informationsecurity #CyberSec #networking #offensivesecurity #infosecurity #cyberattacks #security #oscp #cybersecurityawareness #bugbounty #bugbountytips
DNS Query
1
DNS Records
1
🔓 The Art of Post-Exploitation (Cheat Sheet)

🚀 Key Phases
1️⃣ Initial Access → 2️⃣ Lateral Movement → 3️⃣ Privilege Escalation → 4️⃣ Persistence → 5️⃣ Exfiltration

Top Tools

Mimikatz (Cred Dumping)

Cobalt Strike (C2)

Metasploit (Exploitation)

Impacket (Lateral Movement)

🔥 Hot Techniques

LSASS Dumping: procdump -ma lsass.exe

Pass-the-Hash: sekurlsa::pth /user:admin /ntlm:<hash>

Kerberoasting: GetUserSPNs.py -request

RDP Hijacking: xfreerdp /u:admin /v:target_ip

🛡️ Defensive Tips
Disable WDigest (Prevent cred dumping)
Monitor LSASS access
Restrict RDP/SMB access
Enable Windows Defender Cred Guard

📌 Case Studies

PrintNightmare (CVE-2021-34527) → SYSTEM access

DNS Tunneling → Stealthy data exfiltration
2