Penetration Testing | Hacking Articles
858 FOLLOWERS
Hacking Articles is a very interesting blog about information security, penetration testing and vulnerability assessment managed by Raj Chandel.Follow this blog to find articles on Penetration Testing.
Penetration Testing | Hacking Articles
3w ago
Feroxbuster is a robust tool designed to identify directories and files on web servers using brute-force techniques. It is frequently utilized in penetration testing and
The post A Detailed Guide on Feroxbuster appeared first on Hacking Articles ..read more
Penetration Testing | Hacking Articles
2M ago
MySQL is an open-source Relational Database Management System (RDBMS). It is widely used for managing and organizing data in a structured format, using tables to
The post Penetration Testing on MYSQL (Port 3306) appeared first on Hacking Articles ..read more
Penetration Testing | Hacking Articles
5M ago
Jenkins is an open-source automation server used for continuous integration (CI) and continuous delivery (CD). It’s built on Java and utilizes a scripting platform for automation. Jenkins automates tasks such as building, testing, and deployment in the software development lifecycle. This automation accelerates development cycles, enhances code quality, and streamlines releases. Key features include CI/CD pipelines, automated testing, integration with version control systems, extensibility via plugins, and robust monitoring and reporting capabilities.
Table of Contents
Lab Setup
Installation ..read more
Penetration Testing | Hacking Articles
5M ago
Apache Tomcat, developed by the Apache Software Foundation, is a widely used web server and servlet container. Originally, it served as a demonstration platform for Java Servlet and JavaServer Pages (JSP) technologies, which are used in Java web applications. As time passed, Tomcat expanded its capabilities to support additional Java web technologies.
A notable feature of Tomcat is its support for deploying web applications using WAR (Web Application Archive) files. These files bundle together all the components of a web application, including code, pages, and files, making deployment simpler ..read more
Penetration Testing | Hacking Articles
6M ago
In the realm of cybersecurity, network scanning tools play a vital role in reconnaissance and vulnerability assessment. Among the array of options available, Rustscan has emerged as a formidable contender, offering speed, efficiency, and versatility that distinguish it from traditional tools like Nmap.
Table of Contents
What sets Rustscan apart?
Advantages of Rustscan over Nmap
Usage (Docker)
Installation and Usage (Standalone)
Rustscan flags
Conclusion
What sets Rustscan apart?
Rustscan is an open-source network scanner developed in the Rust programming language. Its lightweight design, opt ..read more
Penetration Testing | Hacking Articles
6M ago
Pentesters rely on a variety of tools to establish connections and maintain access during security assessments. One critical component of their toolkit is the listener—a program that listens for incoming connections and facilitates communication with compromised systems.
In this blog post, we’ll delve into different listener options, exploring features and use cases for popular tools such as Netcat, Rlwrap, Rustcat, Pwncat and Windows ConPty shell.
Table of Content
Reverse Shell Generator
Netcat for Beginners
Rlwrap for OSCP
Rustcat for OSCP
Pwncat for Read Teamers
Windows ConPty for OS ..read more
Penetration Testing | Hacking Articles
6M ago
Introduction
Shellcodes are machine instructions that are used as a payload in the exploitation of a vulnerability. An exploit is a small code that targets a vulnerability. Shellcodes are written in assembly. We generally refer to sites like shell-storm.org to get shellcodes and attach them to our exploits. But how can we make our shellcodes?
This series of articles focuses on creating our shellcodes. In Part 1, we’d be understanding basic assembly instructions, writing our very first assembly code, and turning that into a shell code.
Table of Content
Understanding CPU Registers
First Assembl ..read more
Penetration Testing | Hacking Articles
8M ago
This comprehensive guide delves into the intricacies of Lateral Movement utilizing Ligolo-Ng, a tool developed by Nicolas Chatelain. The Ligolo-Ng tool facilitates the establishment of tunnels through reverse TCP/TLS connections using a tun interface, avoiding the necessity of SOCKS. This guide covers various aspects, from the tool’s unique features to practical applications such as single and double pivoting within a network.
Download Ligolo-Ng:
Ligolo-Ng can be downloaded from the official repository: Ligolo-Ng Releases.
Table of Contents:
Introduction to Ligolo-Ng
Ligolo V/S Chisel
Lab Set ..read more
Penetration Testing | Hacking Articles
9M ago
In this article, we will learn how to get a reverse in a few easy steps. Usually, the problem when reverse shell commands is to remember its long and complicating syntax. But due to growing AI of our digital world, this problem tackled and dealt with. Let’s see how it is done through this article.
Table of Content
What is Reverse Shell?
Types of Reverse Shell
Working of Reverse Shell
Reverse Shell Generator – 1
Reverse Shell Generator – 2
Hack tool
Shellz
Mitigation
What is Reverse Shell?
A reverse shell is a technique used in computer security and hacking that allows an attacker to gain con ..read more
Penetration Testing | Hacking Articles
1y ago
In this article, we will learn how to customise the Firefox browser for efficient pen-testing along with extensions you can use for the same purpose.
Table of Contents:
Introduction
Understanding the Role of the Browser in Penetration Testing
Extensions for efficient pen-testing
Wappalyzer
Foxyproxy
Hacktool
Hackbar
Tamper data
User-agent Switcher
Cookie editor
Temp mail
Built with
Conclusion
Mindmap
Introduction
In the ever-evolving landscape of cybersecurity, penetration testing stands as a crucial pillar of defence against the relentless onslaught of cyber threats. Penetration testers, of ..read more