Hacking Articles
774 subscribers
155 photos
42 files
123 links
House of Pentester
Download Telegram
Comprehensive Guide on Ncrack – A Brute Forcing Tool

In this article, we will be exploring the topic of network authentication using Ncrack. Security professionals depend on Ncrack while auditing their clients.

✴ Twitter: https://lnkd.in/e7yRpDpY

🎱 Introduction to Ncrack
🎱Authentication Phase
🎱Misc Phase
🎱Output Format
🎱Timing and Performance
🎱Target Specification
A Detailed Guide on Linux Incident Response

✴ Twitter: Share this guide

Master Linux forensic investigation with this SANS-certified methodology covering:

☒ Filesystem Timelines - M/A/C/B timestamps analysis
☒ Memory Acquisition - AVML vs LiME vs /proc techniques
☒ Threat Hunting - Rootkit detection (chkrootkit/rkhunter)
☒ Log Analysis - auth.log, journalctl, and firewall logs
☒ Persistence Mechanisms - Cron jobs, .bashrc hooks, LKMs
☒ Disk Forensics - EWF/VMDK mounting with ewfmount/guestmount
πŸ”₯ CISSP Training Program (Online) πŸ”₯ – Register Now! πŸš€

πŸ”— Register here: https://forms.gle/bowpX9TGEs41GDG99
πŸ’¬ WhatsApp: https://wa.me/message/HIOPPNENLOX6F1

πŸ“§ Email: info@ignitetechnologies.in

Join Ignite Technologies CISSP live sessions with core practicals at Lowest Price.
BOOK YOUR Seat NOW ………….


πŸ” Security and Risk Management
πŸ“¦ Asset Security
πŸ—οΈ Security Architecture and Engineering
🌐 Communication and Network Security
πŸ§‘β€πŸ’» Identity and Access Management (IAM)
πŸ§ͺ Security Assessment and Testing
βš™οΈ Security Operations
πŸ’» Software Development Security
πŸ”₯ Ethical Hacking Proactive Training πŸ”₯

πŸ”— Register here: https://forms.gle/bowpX9TGEs41GDG99
πŸ’¬ WhatsApp: https://wa.me/message/HIOPPNENLOX6F1

πŸ“§ Email: info@ignitetechnologies.in

Join Ignite Technologies ETHICAL HACKING PROACTIVE TRAINING live sessions with core practicals at Lowest Price.
BOOK YOUR DEMO NOW ………….

πŸ“˜ M1-Introduction
🏫 OLD School Learning
🌐 Basic of Networks
πŸ” Recon - Footprinting
πŸ“‘ Recon - Network Scanning
πŸ“œ Recon - Enumeration
πŸ’» System Hacking
πŸ”— Post Exploitation & Persistence
πŸ–₯ Webservers Penetration Testing
🌍 Website Hacking
🦠 Malware Threats
πŸ“Ά Wireless Networks Hacking
πŸ” Cryptography & Steganography
πŸ•΅οΈ Sniffing Attack
🚫 Denial of Service
πŸ›‘ Evading IDS, Firewalls & Honey Pots
🎭 Social Engineering
πŸ“± Hacking Mobile Platforms
Windows Persistence using WinLogon

πŸ”₯ Telegram: https://t.me/hackinarticles

In this article, we are going to describe the ability of the WinLogon process to provide persistent access to the Target Machine.

πŸ“˜ Introduction
βš™οΈ Configurations Used in Practical
πŸ—οΈ Default Registry Key Values
πŸ“Œ Persistence Using WinLogon
πŸ”‘ Using Userinit Key
πŸ’» Using the Shell Key
πŸ•΅οΈ Detection
πŸ›‘οΈ Mitigation
Comprehensive Guide on XXE Injection

πŸ”₯ Telegram: https://t.me/hackinarticles

today in this article, we will learn how an attacker can use this vulnerability to gain information and try to defame web-application.

πŸ“˜ Introduction to XML
πŸ’‰ Introduction to XXE Injection
⚠️ Impacts
🌐 XXE for SSRF
πŸ“‚ Local File
🌍 Remote File
πŸ’£ XXE Billion Laugh Attack
πŸ“€ XXE using File Upload
πŸ–₯️ Remote Code Execution
πŸ§ͺ XSS via XXE
πŸ”§ JSON and Content Manipulation
πŸ‘οΈβ€πŸ—¨οΈ Blind XXE
πŸ›‘οΈ Mitigation Steps
GenAI Red Teaming Guide

✴ Twitter: Link
Key focus areas:

πŸ” Model Risks

Prompt injection, data leaks, hallucinations

πŸ›  System Weaknesses

API abuse, RAG poisoning, jailbreaks

☒ Runtime Threats

Social engineering, agent hijacking

πŸ”§ Top Tools

PyRIT, Garak, Promptfoo
API Penetration Testing Training (Online)

πŸ”— Register here: https://forms.gle/bowpX9TGEs41GDG99
πŸ’¬ WhatsApp: https://wa.me/message/HIOPPNENLOX6F1

πŸ“§ Email: info@ignitetechnologies.in

Hurry up, get enrolled yourself with Ignite Technologies’ fully exclusive Training Program "API Penetration Testing Training."

βœ”οΈ Table of Content

πŸ“˜ Course Introduction
πŸ” How API works with Web application
βš–οΈ Types of APIs and their advantages/disadvantages
πŸ”Ž Analysing HTTP request and response headers
πŸ›‘οΈ API Hacking methodologies
πŸ“„ Enumerate web pages and analyse functionalities
πŸ•΅οΈ API passive reconnaissance Strategies
πŸš€ API active reconnaissance (Kite runner)
πŸ”§ Introduction to POSTMAN
πŸ” Testing for Excessive data exposure
πŸ“‚ Directory indexing / brute force
πŸ”‘ Password mutation
🎯 Password spray attacks against web application
πŸ›‘οΈ Introduction to JSON Web Token
πŸ•΅οΈ Hunting for JWT authentication vulnerabilities
πŸ’£ Exploiting JWT unverified signature
πŸ”“ Cracking JWT secret keys
🚫 Bypass JWT removing signature
πŸ’‰ Exploit jku header injection
πŸ”§ Exploit KID in JSON web tokens
πŸ” Attacking 0Auth 2.0
πŸ“Š Introduction to OWASP TOP 10 API
βš”οΈ Hunting and exploiting XXS in API
πŸ•΅οΈ Testing for the ReDOS attack in the API web application
πŸ’₯ Exploiting XML vulnerabilities
πŸ”§ WordPress XML-RPC attack
🌐 Exploiting WSDL/SOAP to RFI
πŸ€– API Automated Vulnerability scanning
πŸ’‰ Testing SQL/NoSQL Injection in an API
πŸ”“ Exploiting object-level access control
πŸ”§ Exploiting Function level access control
πŸ“‘ Testing in-band SSRF vulnerabilities in an API
🌍 Testing out-band SSRF vulnerabilities in an API
βš™οΈ Testing OS Command Injection
β˜• Exploiting Java deserialization vulnerabilities
πŸ—‚οΈ Testing for improper assets management
πŸ“¦ Testing for Mass assignment vulnerabilities
🚧 Bypass filter, space, and blacklisted characters
πŸ” Bypass Captcha and MFA
πŸ“‹ Remediations and Reporting