Skip to content

Hacking Articles

Raj Chandel's Blog

  • Courses We Offer
  • CTF Challenges
  • Penetration Testing
  • Web Penetration Testing
  • Red Teaming
  • Donate us
Penetration Testing

Exploit Remote Windows PC using i-FTP Schedule Buffer Overflow

January 17, 2015 by raj2 Min Reading

This module exploits stack-based buffer overflow vulnerability in i-Ftp v2.20, caused by a long time value set for scheduled download. By persuading the victim to

Cyber Forensics

How to Collect Email Evidence in Victim PC (Email Forensics)

January 14, 2015 by raj1 Min Reading

Dump it Tool utility is used to generate a physical memory dump of Windows machines. It works with both x86 (32-bits) and x64 (64-bits) machines.

Cyber Forensics

Forensics Analysis of Social Media Sites like Facebook, Twitter, LinkedIn

January 13, 2015 by raj2 Min Reading

Dump it Tool utility is used to generate a physical memory dump of Windows machines. It works with both x86 (32-bits) and x64 (64-bits) machines.

CTF Challenges, VulnHub

Xerxes: 1 Vulnhub Walkthrough

November 24, 2014 by raj8 Min Reading

Welcome to another boot2root CTF challenge “Xerxes: 1” uploaded by bas on vulnhub. As, there is a theme, and you will need to snag the

Penetration Testing

Hack Saved LastPass Master Password in Remote Windows, Linux, MAC PC

November 1, 2014 by raj1 Min Reading

This module extracts and decrypts LastPass master login accounts and passwords Exploit Targets lastpass Requirement Attacker: kali Linux Victim PC: Windows 7 Open Kali terminal

Penetration Testing

Hack Remote Windows PC using Windows Track Popup Menu Win32k NULL Pointer Dereference

November 1, 2014 by raj1 Min Reading

This module exploits a NULL Pointer Dereference in win32k.sys, the vulnerability can be triggered through the use of TrackPopupMenu. Under special conditions, the NULL pointer

Penetration Testing

Hack Remote Windows PC using BadBlue Exploit

October 22, 2014 by raj1 Min Reading

BadBlue is software which can use for photos, videos, music, and business files with friends and colleagues instantly. First scan badblue service the victim pc

Penetration Testing

How to Gather Applied Patches in Remote Windows PC

September 25, 2014 by raj1 Min Reading

This module will attempt to enumerate which patches are applied to a windows system based on the result of the WMI query: SELECT HotFixID FROM

Penetration Testing

Exploit Windows PC using Wing FTP Server Authenticated Command Execution

September 13, 2014 by raj1 Min Reading

This module exploits the embedded Lua interpreter in the admin web interface for versions 4.3.8 and below. When supplying a specially crafted HTTP POST request

Posts pagination

Previous 1 … 146 147 148 … 156 Next

Categories

Join Our Training Program

Join Our Telegram Channel

Join Our Discord Channel

Cyber Security Mindmap

Follow us on Twitter

Follow us on Linkedin

© All Rights Reserved 2021 Theme: Prefer by Template Sell.