Quantcast
Channel: Hacking Articles
Browsing all 1748 articles
Browse latest View live

SIEM: Windows Client Monitoring with Splunk

In our previous article, we have covered with Splunk master server setup with a brief demonstration of Dashboard setup or Log monitoring you can visit that article from here. Once done with a complete...

View Article


USB Forensics: Detection & Investigation

Universal Serial Bus flash drives, commonly known as USB flash drives are the most common storage devices which can be found as evidence in Digital Forensics Investigation. The digital forensic...

View Article


Forensic Investigation: Preserve Time Stamp

As a Digital Forensic Investigator, you might understand, how important it is to preserve timestamps of any evidence gathered at the scene of a crime. You will be on your toes to make sure that the...

View Article

Docker for Pentester: Image Vulnerability Assessment

We are moving from virtualization to containerization and we are all familiar with the container services such as docking or quay.io. You can pick a dock image for a particular application by selecting...

View Article

Digital Forensics: An Introduction

Digital Forensics is the application of scientific methods in preserving, recovering, and investigating digital evidence in a Digital crime scenario.  It can be correctly defined as, collection,...

View Article


Docker for Pentester: Abusing Docker API

As you know, docking services are booming, docking container attacks are also on the rise. But this post will illustrate how the intruder is trying to compromise the docker API due to a weak setup....

View Article

CryptoBank: 1: Vulnhub Walkthrough

Introduction Today we are going to crack this vulnerable virtual machine called CryptoBank 1. It was created by emaragkos.  This is a Capture the Flag type of challenge. It contains one flag that is...

View Article

Loly: 1 Vulnhub Walkthrough

Hello Folks, in this article, we are going to solve a Capture the Flag (CTF) challenge of LOLY:1 from Vulnhub and the URL for this CTF is https://vulnhub.com/entry/loly-1,538/. This CTF is posted by...

View Article


Tomato: 1 Vulnhub Walkthrough

Today we are going to solve another boot2root challenge called “Tomato: 1“.  It’s available at VulnHub for penetration testing and you can download it from here. The merit of making this lab is due to...

View Article


Chili: 1 Vulnhub Walkthrough

Today we are going to solve another boot2root challenge called “Chili: 1“.  It’s available at VulnHub for penetration testing and you can download it from here. The merit of making this lab is due to...

View Article

Healthcare: 1 Vulnhub Walkthrough

Today we are going to solve another boot2root challenge called “HEALTHCARE 1”. It is developed to train student the art of penetration testing.  The credit of making this lab goes to v1n1v131r4 and lab...

View Article

ShellDredd #1 Hannah Vulnhub Walkthrough

Today we will solve a new boot2root challenge named “ONSYSTEM: SHELLDREDD # 1 HANNAH“. For penetration testing, it is available on VulnHub and we can download it from here. The credit goes to d4t4s3c...

View Article

Star Wars: 1 Vulnhub Walkthrough

Hi friends, Today I am going to share a writeup for gaining root access for the vulnhub machine “star-wars-ctf-1”. It contains one flag that is accessible after gaining root level privilege on the...

View Article


CengBox: 2: Vulnhub Walkthrough

Introduction Today we are going to crack this vulnerable machine called CengBox: 2. It was created by Arslan Bilecen.  This is a Capture the Flag type of challenge. It contains two flags that is...

View Article

Mercury: Vulnhub Walkthrough

Introduction Here is another Vulnerable machine called Mercury. It is available on vuln hub. Let’s move further towards this CTF challenge. There are two flags on the box: a user and root flag which...

View Article


Cewlkid: 1 Vulnhub Walkthrough

Today, we are going to solve another boot2root challenge called “Cewlkid: 1“.  It is available at VulnHub for penetration testing practices and you can download it from here. The commendation of making...

View Article

Nyx: 1: Vulnhub Walkthrough

Introduction Today we are going to crack this vulnerable machine called Nyx: 1. It was created by 0xatom. You could contact him on Discord. This is a Capture the Flag type of challenge. It contains two...

View Article


Digital Forensics: An Introduction (Part 2)

In the first part of this article, we have seen the Elements of a Digital Crime, Goals of Digital Forensic Investigation, Classification of Digital Forensics, Digital Evidence, Principles of Digital...

View Article

Threat Hunting: Velociraptor for Endpoint Monitoring (Part 2)

In our previous article, we have covered with Velociraptor master server setup with a brief demonstration of Velociraptor installation, GUI interface set up with some of the forensics Artifacts If you...

View Article

Durian: 1 Vulnhub Walkthrough

Today we are going to solve another boot2root challenge called “Durian: 1“.  It’s available at VulnHub for penetration testing and you can download it from here. The merit of making this lab is due to...

View Article
Browsing all 1748 articles
Browse latest View live