Skip to content

Hacking Articles

Raj Chandel's Blog

  • Courses We Offer
  • CTF Challenges
  • Penetration Testing
  • Web Penetration Testing
  • Red Teaming
  • Donate us
Cyber Forensics

How to study Forensics Evidence of PC using P2 Commander (Part 2)

May 18, 2015 by raj3 Min Reading

Now we are studying about the forensic evidence which we have collected in the previous article using P2 Commander. If you want to see the

Cyber Forensics

How to Collect Forensics Evidence of PC using P2 Commander (Part 1)

May 16, 2015 by raj3 Min Reading

P2C is a comprehensive digital investigation tool with over ten years of court-approved use by forensic examiners. An integrated database and true multi-threading mean faster

Penetration Testing

Exploit Remote PC using Adobe Flash Player domainMemory ByteArray Use After Free

May 16, 2015 by raj2 Min Reading

This module exploits a use-after-free vulnerability in Adobe Flash Player. The vulnerability occurs when the ByteArray assigned to the current ApplicationDomain is freed from an

Penetration Testing

Exploit Remote PC using Adobe Flash Player NetConnection Type Confusion

May 15, 2015 by raj2 Min Reading

This module exploits type confusion vulnerability in the NetConnection class on Adobe Flash Player. When using a correct memory layout this vulnerability allows to corrupt

Cyber Forensics

How to Create Forensics Image of PC using R-Drive Image

May 13, 2015 by raj5 Min Reading

R-Drive Image is a potent utility providing disk image files creation for backup or duplication purposes. A disk image file provides the exact, byte-by-byte copy

Penetration Testing

Exploit Remote PC using Adobe Flash Player Uncompress Via Zlib Variant Uninitialized Memory

May 8, 2015 by raj2 Min Reading

This module exploits an unintialized memory vulnerability in Adobe Flash Player. The vulnerability occurs in the ByteArray::Uncompress Via ZlibVariant method, which fails to initialize allocated

Penetration Testing

Hack Remote Windows PC using Publish-It PUI Buffer Overflow (SEH)

April 30, 2015 by raj1 Min Reading

This module exploits a stack based buffer overflow in Publish-It when processing a specially crafted .PUI file. This vulnerability could be exploited by a remote

Penetration Testing

Exploit Remote PC using Adobe Flash Player copy Pixels to ByteArray Integer Overflow

April 23, 2015 by raj2 Min Reading

This module exploits an integer overflow in Adobe Flash Player. The vulnerability occurs in the copyPixelsToByteArray method from the BitmapData object. The position field of

Penetration Testing

Exploit Remote PC using Adobe Flash Player PCRE Regex Vulnerability

April 6, 2015 by raj1 Min Reading

This module exploits a vulnerability found in Adobe Flash Player. A compilation logic error in the PCRE engine, specifically in the handling of the \c

Posts pagination

Previous 1 … 144 145 146 … 156 Next

Categories

Join Our Training Program

Join Our Telegram Channel

Join Our Discord Channel

Cyber Security Mindmap

Follow us on Twitter

Follow us on Linkedin

© All Rights Reserved 2021 Theme: Prefer by Template Sell.