Skip to content

Hacking Articles

Raj Chandel's Blog

  • Courses We Offer
  • CTF Challenges
  • Penetration Testing
  • Web Penetration Testing
  • Red Teaming
  • Donate us
Lateral Movement, Red Teaming

Lateral Movement: Enabling RDP Remotely

April 16, 2026April 16, 2026 by raj9 Min Reading

This article presents a hands-on walkthrough demonstrating multiple real-world techniques to remotely enable RDP on a Windows Server 2019 Domain Controller (DC.ignite.local, 192.168.1.11) and subsequently

Penetration Testing

A Detailed Guide on SSH Port forwarding & Tunnelling

April 14, 2026April 15, 2026 by raj16 Min Reading

This article walks through SSH tunnelling in a practical, lab‑oriented way. You will see how to set up a loopback‑bound Apache2 web server as a

Penetration Testing

A Detailed Guide on Local Port Forwarding

April 12, 2026April 16, 2026 by raj19 Min Reading

In the contemporary digital world, penetration testing and red team engagements, direct access to target systems from the attacker’s machine is uncommon. Many services are

Domain Enumeration, Red Teaming

Active Directory Enumeration: Net RPC

April 10, 2026April 14, 2026 by raj13 Min Reading

This article provides a detailed net rpc operations performed against the ignite.local domain (DC: 192.168.1.11). Introduction Active Directory (AD) is the backbone of identity and

Penetration Testing

Network Pivoting using Ligolo-MP – Complete Guide

April 10, 2026April 14, 2026 by raj10 Min Reading

In modern penetration testing, gaining an initial foothold on an internet-facing machine is rarely the end goal. The most sensitive assets — databases, domain controllers,

Domain Enumeration, Red Teaming

Active Directory Enumeration: pywerview

April 8, 2026April 8, 2026 by raj12 Min Reading

Executive Summary This report documents a comprehensive Active Directory (AD) enumeration exercise conducted against the ignite.local domain. Using pywerview, a Python-based port of the PowerView

Penetration Testing

NTLM Reflection Attack

April 6, 2026April 6, 2026 by raj11 Min Reading

In Active Directory environments, delegation abuse via NTLM reflection is a common attack technique. Attackers exploit misconfigured delegation settings to reflect NTLM authentication back to

Penetration Testing

Windows Dll Execution Techniques

April 4, 2026April 14, 2026 by raj8 Min Reading

Overview Dynamic Link Libraries (DLLs) are shared code modules on Microsoft Windows that can be loaded and executed at runtime by host processes. Because DLL

Domain Escalation, Red Teaming

Kerberos Constrained Delegation Exploitation

April 2, 2026April 13, 2026 by raj10 Min Reading

Kerberos Constrained Delegation (KCD) is one of the most powerful and frequently abused features in Microsoft Active Directory environments. When an administrator configures a service

Posts pagination

1 2 … 157 Next

Categories

Join Our Training Program

Join Our Telegram Channel

Join Our Discord Channel

Cyber Security Mindmap

Follow us on Twitter

Follow us on Linkedin

© All Rights Reserved 2021 Theme: Prefer by Template Sell.