Learn Ethical Hacking

[Ethical Hacking][bsummary]
latest posts

Hacking and PenTesting Captive Portal Enabled Wireless Networks

 Hello all, This is a simple cheat sheet for Hacking/Pentesting Captive Portals Enabled Wireless/Wifi networks Before Starting the attack, i...

RPC Pentest Checklist

  #nmap Scan for RPC nmap -sC -sV 10.10.10.10 -p111 -Pn > output PORT STATE SERVICE VERSION 111/tcp open rpcbind 2-4 (RPC #100000) | ...

SMB Pentest Checklist

  SMB Enumeration smbmap -H 10.10.10.10 //Check Privileges smbmap -H 10.10.10.10 -R --depth 5 smbclient -L //10.10.10.10/ ...

Abusing DPAPI using Mimikatz

What is DPAPI ?  According to wiki, DPAPI (Data Protection Application Programming Interface) is a simple cryptographic application programm...

Breaking Out of Containers - Exploiting Sys_Module Capability

  Linux Capabilities are used to allow binaries (executed by non-root users) to perform privileged operations without providing them all roo...

Relay Attacks - Active Directory Penetration Testing

  Here is another continuation of Active Directory Penetration Testing cheatsheet, this time - I am putting together few of the common relay...

5 Mac Hacks to Make it Feel More Like a PC

There is no doubt that Mac offers seamless operations and smoothness that very few other brands can deliver to escalate your convenience. Ho...

Active Directory PenTest Cheat Sheet - Lateral Movement & Persistence Techniques

Hello Readers, Welcome to Hacking Dream. Today' post is on Active directory Penetration testing, this is a continuation of  ACTIVE DIREC...

Cheat Sheets

[Cheatsheet][grids]

Learn Hacking Wifi Networks

[How To Hack Wifi][grids]