Learn Ethical Hacking

[Ethical Hacking][bsummary]
latest posts

Breaking Out of Containers - Exploiting Sys_Module Capability

  Linux Capabilities are used to allow binaries (executed by non-root users) to perform privileged operations without providing them all roo...

Relay Attacks - Active Directory Penetration Testing

  Here is another continuation of Active Directory Penetration Testing cheatsheet, this time - I am putting together few of the common relay...

5 Mac Hacks to Make it Feel More Like a PC

There is no doubt that Mac offers seamless operations and smoothness that very few other brands can deliver to escalate your convenience. Ho...

Active Directory PenTest Cheat Sheet - Lateral Movement & Persistence Techniques

Hello Readers, Welcome to Hacking Dream. Today' post is on Active directory Penetration testing, this is a continuation of  ACTIVE DIREC...

Active Directory Penetration Testing Cheat Sheet - Recon & Initial Access

Hello Everyone, I am back after a long time. Today' post is on Active directory reconnaissance and gaining initial foot hold into the ta...

XNSPY vs Spyera: Which Hacking App to Pick

  Getting your hands on the right smartphone hacking app can be very tricky. This is because there are plenty of options to choose from, wit...

How to Crack Microsoft Office 365 License

Hello Everyone, Today’s article is on Cracking Microsoft Office 365 License. Usually, when you install office 365 you get 30 days of free...

OSCP Review – How To Pass OSCP on first Attempt

OSCP – Offensive security certified professional – Penetration testing with Kali Linux is a certification offered by offensive security. T...

Cheat Sheets

[Cheatsheet][grids]

Learn Hacking Wifi Networks

[How To Hack Wifi][grids]