Quantcast
Channel: Hacking Articles|Raj Chandel's Blog
Browsing all 1812 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Burpsuite Encoder & Decoder Tutorial

Burpsuite Decoder can be said as a tool which is used for transforming encoded data into its real form, or for transforming raw data into various encoded and hashed forms. This tool is capable of...

View Article


Image may be NSFW.
Clik here to view.

Forensic Imaging through Encase

Scenerio: Mr X is suspected to be involved in selling his company’s confidential data to the competitors, but without any evidence no action could be taken against him. To get into reality and proof Mr...

View Article


Image may be NSFW.
Clik here to view.

Hack the USV: 2017 (CTF Challenge)

Hello friends! Today we are going to take another CTF challenge known as USV: 2017. The credit for making this vm machine goes to “Suceava University” and it is another capture the flag challenge in...

View Article

Image may be NSFW.
Clik here to view.

Post Exploitation on Windows PC (System Command)

This article is about Post Exploitation on the Victim’s System using the Windows Command Line. When an Attacker gains a meterpreter session on a Remote PC, then he/she can enumerate a huge amount of...

View Article

Image may be NSFW.
Clik here to view.

Digital Forensics Investigation using OS Forensics (Part1)

About OSForensicsOSForensics from PassMark Software is a digital computer forensic application which lets you extract and analyse digital data evidence efficiently and with ease. It discovers,...

View Article


Image may be NSFW.
Clik here to view.

Bypass Firewall Restrictions with Metasploit (reverse_tcp_allports)

IntroductionNetwork Address Translation generally involves re-writing the source and/or destination addresses of IP packets as they pass through a router or firewall  (from...

View Article

Image may be NSFW.
Clik here to view.

Beginners Guide to Burpsuite Payloads (Part 2)

Hello Friends!!  In our previous article part1 we had discussed how to perform brute force attack on any web application server for making unauthorized login into it using some Payload of Burpsuite. In...

View Article

Image may be NSFW.
Clik here to view.

Wordpress Exploitation using Burpsuite (Burp_wp Plugin)

Burp_wp is an extension of burpsuite used to scan and find vulnerabilities in wordpress plugins and themes using burpsuite proxy. It was created by Kacper Szurek and can be downloaded from here.Let’s...

View Article


Image may be NSFW.
Clik here to view.

Digital Forensics Investigation through OS Forensics (Part 2)

In Part 1 of this article we have covered Creating case, File Search and Indexing. This article will cover some more features/ functionalities of OSForensics.For Part 1 if this article click...

View Article


Image may be NSFW.
Clik here to view.

Nmap Scans using Hex Value of Flags

In this article we are going to scan the target machine by sending TCP flags through their hexadecimal value and the actual Flag name can be confirm by analysis of Nmap traffic through Wireshark. Let’s...

View Article

Image may be NSFW.
Clik here to view.

Post Exploitation Using WMIC (System Command)

This article is about Post Exploitation using the WMIC (Windows Management Instrumentation Command Line). When an Attacker gain a meterpreter session on a Remote PC, then he/she can enumerate a huge...

View Article

Image may be NSFW.
Clik here to view.

Convert Virtual Machine to Raw Images for Forensics (Qemu-Img)

This is a very handy little application. It’s been developed by the QEMU team. The software is very useful when dealing with virtualization, Qemu-img is available for both windows and Linux. Its...

View Article

Image may be NSFW.
Clik here to view.

Digital Forensics Investigation through OS Forensics (Part 3)

In Part 2 of this article we have covered Recent Activity, Deleted File Search, Mismatch File Search, Memory Viewer and Prefetch Viewer. This article will cover some more features/ functionalities of...

View Article


Image may be NSFW.
Clik here to view.

Hack the VM Bsides London 2017(boot2root)

Hello friends! Today we are going to take another CTF challenge known as Bsides London 2017. The credit for making this vm machine goes to “Hacker House” and it is another boot2root challenge in which...

View Article

Image may be NSFW.
Clik here to view.

Payload Processing Rule in Burp suite (Part 1)

Hello friends!! Today we are going to discuss “Payload Processing” option of Burpsuite which is advance functionality comes under Intruder Tab for making brute force attack. Payload ProcessingPayload...

View Article


Image may be NSFW.
Clik here to view.

Hack the C0m80 VM (Boot2root Challenge)

Hello friends! Today we are going to take another CTF challenge known as C0m80. The credit for making this vm machine goes to “3mrgnc3” and it is another boot2root challenge in which our goal is to get...

View Article

Image may be NSFW.
Clik here to view.

Engagement Tools Tutorial in Burp suite

Hello friends!! Today we are going to discuss Importance of Engagement toolswhich is a Pro-only feature of Burp Suite. It is mainly use in information gathering and hence the analysis of any web...

View Article


Image may be NSFW.
Clik here to view.

Payload Processing Rule in Burp suite (Part 2)

Hello friends!! Today we are going to discuss “Payload Encoding” option followed by payload processing of Burpsuite which is advance functionality comes under Intruder Tab for making brute force...

View Article

Image may be NSFW.
Clik here to view.

Beginner Guide to IPtables

Hello friends!! In this article we are going to discuss on Iptables and its uses. Iptablesis a command-line firewall, installed by default on all official Ubuntu distributions. Using Iptables, you can...

View Article

Image may be NSFW.
Clik here to view.

Bind payload using SFX archive with Trojanizer

The Trojanizer tool uses WinRAR (SFX) to compress the two files input by user, and transforms it into an SFX executable (.exe) archive. The SFX archive when executed it will run both files (our payload...

View Article
Browsing all 1812 articles
Browse latest View live


<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>