Article Categories
- All Categories
-
Data Structure
-
Networking
-
RDBMS
-
Operating System
-
Java
-
MS Excel
-
iOS
-
HTML
-
CSS
-
Android
-
Python
-
C Programming
-
C++
-
C#
-
MongoDB
-
MySQL
-
Javascript
-
PHP
-
Economics & Finance
Articles by Ajay yadav
Page 2 of 4
Registry Forensic
The Windows Registry is a central hierarchical database that stores configuration settings for applications, hardware devices, and users. Beyond system configuration, the Registry maintains extensive records of user activities, recently accessed files, and connected devices, making it a valuable source of forensic evidence. For forensic analysts and system administrators, the Registry provides crucial insights into system usage patterns and potential security incidents that may not be visible through other investigative methods. Windows Registry Structure Prior to Windows 95, system configuration was managed through individual files such as autoexec.bat, config.sys, win.ini, and system.ini. The Registry replaced this fragmented ...
Read MoreAddress Space Layout Randomization (ASLR)
Address Space Layout Randomization (ASLR) is a critical security mechanism that randomizes the memory layout of running programs to prevent attackers from predicting memory addresses. This makes it significantly harder for malicious code to exploit memory corruption vulnerabilities. Memory corruption vulnerabilities occur when a program mistakenly writes attacker-controlled data outside of an intended memory region. This may crash the program or, worse, provide the attacker full control over the system. ASLR serves as a failsafe mechanism to limit the damage should such vulnerabilities be exploited. How ASLR Works ASLR works by randomizing the memory locations where program ...
Read MoreRundll32.exe Attack
A Rundll32.exe attack exploits the legitimate Windows utility rundll32.exe to execute malicious Dynamic Link Libraries (DLLs). Rundll32.exe is a Windows system process that allows programs to invoke functions from DLL files, making it an attractive target for attackers who can abuse this functionality to run malicious code while appearing as legitimate system activity. Attackers leverage rundll32.exe because it can load and execute code from DLL files, and security tools often trust this legitimate Windows process. This technique is commonly used in penetration testing and malware campaigns to bypass security controls and establish remote access to target systems. How ...
Read MoreBypass Antivirus with Shelter
Shellter is a dynamic shellcode injection tool used in penetration testing to bypass antivirus detection. It works by taking legitimate PE (Portable Executable) files and injecting custom payloads into them while maintaining the original application's functionality, making the modified executable appear legitimate to antivirus software. Shellter operates differently from traditional packers or crypters by using dynamic analysis to understand the target executable's behavior, then strategically places shellcode at runtime locations that won't interfere with normal operation. How Shellter Works The tool employs several sophisticated techniques to achieve AV evasion: Dynamic Analysis − Shellter runs the ...
Read MoreGet the Reverse Shell with MSI package
Windows OS comes installed with a Windows Installer engine which is used by MSI packages for the installation of applications. The executable program that interprets packages and installs products is msiexec.exe. In penetration testing, MSI packages can be leveraged to obtain reverse shells on target Windows systems. This technique exploits the legitimate Windows Installer functionality to execute malicious payloads. How It Works The MSI reverse shell technique works by creating a malicious MSI package containing a reverse shell payload. When executed on the target system using msiexec, the package triggers the payload to establish a connection back ...
Read MoreHacking with Santet
This article demonstrates how to use the Santet penetration testing tool, which combines multiple security testing capabilities into a single package. Santet includes payload generation, Facebook group hijacking, SMS bombing, SMS spoofing, and Denial of Service (DoS) attack functionalities for ethical hacking and security research purposes. Important: This tool should only be used in authorized penetration testing environments or for educational purposes. Unauthorized use against systems you don't own is illegal and unethical. Installation and Setup To install Santet on Kali Linux, follow these steps: Step 1: Clone the Repository Open a terminal in Kali ...
Read MoreHacking with HTA file (MSHTA.exe)
The Windows OS utility MSHTA.exe is responsible for running HTA (HTML Application) files that can execute JavaScript or VBScript code. These files can be interpreted and executed using the Microsoft MSHTA.exe tool, making them a potential attack vector for malicious activities. HTA File Execution Process HTA File .hta extension MSHTA.exe Windows utility Code Execution JS/VBScript ...
Read MoreTheZoo Repository Live Malware Analysis
TheZoo is an open-source repository that provides cybersecurity researchers and malware analysts with access to live malware samples for educational and research purposes. It enables the study of malware behavior, analysis techniques, and development of countermeasures in a controlled environment. TheZoo contains a comprehensive collection of malware samples categorized by family, type, and platform. This repository serves as a valuable resource for security professionals, researchers, and students who need to understand how malicious software operates and spreads. Installation and Setup To set up TheZoo repository on your system, follow these steps: git clone https://github.com/ytisf/theZoo cd ...
Read MorePentesting using Docker
Penetration testing using Docker provides security professionals with an efficient way to deploy and test vulnerable applications in isolated environments. Docker containers offer a clean, reproducible setup for security assessments without affecting the host system. Docker is a containerization platform that packages applications with all their dependencies into lightweight, portable containers. This makes it ideal for quickly setting up vulnerable web applications like DVWA (Damn Vulnerable Web Application) for penetration testing practice. Installing Docker Before setting up vulnerable applications, install Docker on your system using these commands: apt update apt install docker.io systemctl start docker ...
Read MoreStein's Algorithm for finding GCD in C++
Stein's Algorithm used for discovering GCD of numbers as it calculates the best regular divisor of two non-negative whole numbers. It replaces division with math movements, examinations, and subtraction. In the event that both an and b are 0, gcd is zero gcd(0, 0) = 0. The algorithm for GCD(a, b) as follows;AlgorithmSTART Step-1: check If both a and b are 0, gcd is zero gcd(0, 0) = 0. Step-2: then gcd(a, 0) = a and gcd(0, b) = b because everything divides 0. Step-3: check If a and b are both even, gcd(a, b) = 2*gcd(a/2, ...
Read More