Learn Ethical Hacking

[Ethical Hacking][bsummary]
latest posts

Active Directory PenTest Cheat Sheet - Lateral Movement & Persistence Techniques

Hello Readers, Welcome to Hacking Dream. Today' post is on Active directory Penetration testing, this is a continuation of  ACTIVE DIREC...

Active Directory Penetration Testing Cheat Sheet - Recon & Initial Access

Hello Everyone, I am back after a long time. Today' post is on Active directory reconnaissance and gaining initial foot hold into the ta...

XNSPY vs Spyera: Which Hacking App to Pick

  Getting your hands on the right smartphone hacking app can be very tricky. This is because there are plenty of options to choose from, wit...

How to Crack Microsoft Office 365 License

Hello Everyone, Today’s article is on Cracking Microsoft Office 365 License. Usually, when you install office 365 you get 30 days of free...

OSCP Review – How To Pass OSCP on first Attempt

OSCP – Offensive security certified professional – Penetration testing with Kali Linux is a certification offered by offensive security. T...

SQL Injection Cheat sheet

Hello Everyone, below you can find the cheat sheet for sql injection, its more like sql injection techniques that I frequently use and it...

Buffer Overflow for OSCP - Exploiting SLmail

Hello Hackers, in this article I am going to explain buffer overflow windows 32-bit binary exploitation, its more of a cheat sheet kind ...

How to Brute force Shadow file hashes using John and Hashcat

Welcome hackers, here you go with one of the most interesting topics – cracking passwords. In this post, I am explaining the process of ...

Cheat Sheets

[Cheatsheet][grids]

Learn Hacking Wifi Networks

[How To Hack Wifi][grids]