Skip to content
Hacking Articles

Recent Posts

  • Privacy Protection: Password Manager
  • Privacy Protection: Browser Extensions
  • Sock Puppets in OSINT
  • Netexec for Pentester: SSH Exploitation
  • Privacy Protection: Instant Messaging

Most Used Categories

  • CTF Challenges (504)
    • VulnHub (311)
    • HackTheBox (164)
  • Penetration Testing (408)
  • Red Teaming (126)
  • Website Hacking (64)
  • Cyber Forensics (68)
  • Privilege Escalation (59)
  • Hacking Tools (33)
  • Pentest Lab Setup (29)

Hacking Articles

Raj Chandel's Blog

  • Courses We Offer
  • CTF Challenges
  • Penetration Testing
  • Web Penetration Testing
  • Red Teaming
  • Donate us
Penetration Testing

Exploit Remote PC using Firefox PDF.js Privileged Javascript Injection

September 15, 2015May 27, 2025 by Raj

This module gains remote code execution on Firefox 35-36 by abusing a privilege escalation bug in resource:// URIs. PDF.js is used to exploit the bug.

Penetration Testing

Windows 7 Sticky Key Hack Attack using Metasploit

September 14, 2015May 27, 2025 by Raj

Today we will learn how to extract login credentials from a victim, who is running a Windows System. Using this technique, we can see the

Penetration Testing

Hack Remote Windows PC using Video Charge Studio Buffer Overflow (SEH)

September 9, 2015May 27, 2025 by Raj

This module exploits a stack based buffer overflow in VideoCharge Studio 2.12.3.685 when processing a specially crafted .VSC file. This vulnerability could be exploited by

CTF Challenges, VulnHub

Hack the Holynix: v1 (Boot 2 Root Challenge)

August 3, 2015June 10, 2025 by Raj

Hello friends! Today we are going to take another CTF challenge known as Holynix 1 and it is another boot2root challenge provided for practice and

Penetration Testing

Exploit Remote PC using Adobe Flash Player ByteArray Use After Free

July 17, 2015May 27, 2025 by Raj

This module exploits a use after free on Adobe Flash Player. The vulnerability, discovered by Hacking Team and made public on its July 2015 data

Penetration Testing

Exploit Remote PC using Adobe Flash opaque Background Use After Free

July 17, 2015May 27, 2025 by Raj

This module exploits an use after free on Adobe Flash Player. The vulnerability, discovered by Hacking Team and made public on its July 2015 data

Penetration Testing

Exploit Remote PC using Adobe Flash Player Nellymoser Audio Decoding Buffer Overflow

July 14, 2015May 27, 2025 by Raj

This module exploits a buffer overflow on Adobe Flash Player when handling nellymoser encoded audio inside a FLV video, as exploited in the wild on

Penetration Testing

Exploit Remote Windows PC using Adobe Flash Player Drawing Fill Shader Memory Corruption

July 14, 2015May 27, 2025 by Raj

This module exploits a memory corruption happening when applying a Shader as a drawing fill as exploited in the wild on June 2015. This module

Cyber Forensics

Forensic Investigation of RAW Images using Belkasoft Evidence Center

July 13, 2015May 22, 2025 by Raj

In this article, we delve into RAW Image Forensic with Belkasoft, utilizing Belkasoft Evidence Center to conduct a comprehensive forensic investigation of raw disk images.

Posts pagination

Previous 1 … 140 141 142 … 154 Next

Categories

© All Rights Reserved 2024 Theme: Prefer by Template Sell.