Skip to content

Hacking Articles

Raj Chandel's Blog

  • Courses We Offer
  • CTF Challenges
  • Penetration Testing
  • Web Penetration Testing
  • Red Teaming
  • Donate us
Penetration Testing

Exploit Remote PC using Adobe Flash Player Byte Array with Workers Use after Free

April 6, 2015 by raj2 Min Reading

This module exploits an use after free vulnerability in Adobe Flash Player. The vulnerability occurs when the ByteArray assigned to the current ApplicationDomain is freed

Penetration Testing

Exploit Remote PC using Adobe Flash Player Byte Array Uncompress via ZlibVariant Use after Free

April 1, 2015 by raj2 Min Reading

This module exploits an use after free vulnerability in Adobe Flash Player. The vulnerability occurs in the Byte Array::Uncompress ViaZlibVariant method, when trying to uncompress

Penetration Testing

Exploit Remote Windows, Linux, OSX PC using Firefox Proxy Prototype Privileged JavaScript Injection

April 1, 2015 by raj1 Min Reading

This exploit gains remote code execution on Firefox 31-34 by abusing a bug in the XPConnect component and gaining a reference to the privileged chrome://

Cyber Forensics

How to find the usage of files in Remote victim PC (Remote PC Forensics)

March 29, 2015 by raj7 Min Reading

Today we are going to learn about managing a bunch of files on a remote system using the forfiles command via meterpreter. Table of Content

Penetration Testing

Hack Remote Windows Password using Phishing Login Prompt Exploit

February 26, 2015 by raj1 Min Reading

This module is able to perform a phishing attack on the target by popping up a loginprompt. When the user fills credentials in the loginprompt,

Penetration Testing

Hack Remote Windows PC using Achat Unicode SEH Buffer Overflow

February 21, 2015 by raj1 Min Reading

This module exploits a Unicode SEH buffer overflow in Achat. By sending a crafted message to the default port 9256/UDP, it’s possible to overwrite the

Penetration Testing

Metasploit Tutorial for Beginners (Part 1)

February 18, 2015 by raj7 Min Reading

The Metasploit project is an open-source penetration testing platform that enables you to find and exploit vulnerabilities. In 2003, H.D. Moore created Metasploit as a

Cyber Forensics

How to Collect Telephonic Evidence for Forensic in Victim PC

February 6, 2015 by raj1 Min Reading

Dump it Tool utility is used to generate a physical memory dump of Windows machines. It works with both x86 (32-bits) and x64 (64-bits) machines.

Penetration Testing

Exploit Windows PC using BulletProof FTP Client BPS Buffer Overflow

January 17, 2015 by raj1 Min Reading

This module exploits stack-based buffer overflow vulnerability in BulletProof FTP Client 2010, caused by an overly long hostname. By persuading the victim to open a

Posts pagination

Previous 1 … 145 146 147 … 156 Next

Categories

Join Our Training Program

Join Our Telegram Channel

Join Our Discord Channel

Cyber Security Mindmap

Follow us on Twitter

Follow us on Linkedin

© All Rights Reserved 2021 Theme: Prefer by Template Sell.