Skip to content
Hacking Articles

Recent Posts

  • AWS EC2 Credentials Theft via SSRF Abuse
  • Privacy Protection: Encrypted Notebooks
  • Privacy Protection: File Sharing
  • Privacy Protection: File Encryption
  • Credential Dumping with NetExec (nxc)

Most Used Categories

  • CTF Challenges (504)
    • VulnHub (311)
    • HackTheBox (164)
  • Penetration Testing (408)
  • Red Teaming (125)
  • Website Hacking (64)
  • Cyber Forensics (68)
  • Privilege Escalation (59)
  • Hacking Tools (33)
  • Pentest Lab Setup (29)

Hacking Articles

Raj Chandel's Blog

  • Courses We Offer
  • CTF Challenges
  • Penetration Testing
  • Web Penetration Testing
  • Red Teaming
  • Donate us
Penetration Testing

Exploit Remote PC using Adobe Flash Player NetConnection Type Confusion

May 15, 2015May 27, 2025 by Raj

This module exploits type confusion vulnerability in the NetConnection class on Adobe Flash Player. When using a correct memory layout this vulnerability allows to corrupt

Cyber Forensics

How to Create Forensics Image of PC using R-Drive Image

May 13, 2015May 24, 2025 by Raj

R-Drive Image is a potent utility providing disk image files creation for backup or duplication purposes. A disk image file provides the exact, byte-by-byte copy

Penetration Testing

Exploit Remote PC using Adobe Flash Player Uncompress Via Zlib Variant Uninitialized Memory

May 8, 2015May 27, 2025 by Raj

This module exploits an unintialized memory vulnerability in Adobe Flash Player. The vulnerability occurs in the ByteArray::Uncompress Via ZlibVariant method, which fails to initialize allocated

Penetration Testing

Hack Remote Windows PC using Publish-It PUI Buffer Overflow (SEH)

April 30, 2015May 27, 2025 by Raj

This module exploits a stack based buffer overflow in Publish-It when processing a specially crafted .PUI file. This vulnerability could be exploited by a remote

Penetration Testing

Exploit Remote PC using Adobe Flash Player copy Pixels to ByteArray Integer Overflow

April 23, 2015May 27, 2025 by Raj

This module exploits an integer overflow in Adobe Flash Player. The vulnerability occurs in the copyPixelsToByteArray method from the BitmapData object. The position field of

Penetration Testing

Exploit Remote PC using Adobe Flash Player PCRE Regex Vulnerability

April 6, 2015May 27, 2025 by Raj

This module exploits a vulnerability found in Adobe Flash Player. A compilation logic error in the PCRE engine, specifically in the handling of the \c

Penetration Testing

Exploit Remote PC using Adobe Flash Player Byte Array with Workers Use after Free

April 6, 2015May 27, 2025 by Raj

This module exploits an use after free vulnerability in Adobe Flash Player. The vulnerability occurs when the ByteArray assigned to the current ApplicationDomain is freed

Penetration Testing

Exploit Remote PC using Adobe Flash Player Byte Array Uncompress via ZlibVariant Use after Free

April 1, 2015May 27, 2025 by Raj

This module exploits an use after free vulnerability in Adobe Flash Player. The vulnerability occurs in the Byte Array::Uncompress ViaZlibVariant method, when trying to uncompress

Penetration Testing

Exploit Remote Windows, Linux, OSX PC using Firefox Proxy Prototype Privileged JavaScript Injection

April 1, 2015May 27, 2025 by Raj

This exploit gains remote code execution on Firefox 31-34 by abusing a bug in the XPConnect component and gaining a reference to the privileged chrome://

Posts pagination

Previous 1 … 142 143 144 … 153 Next

Categories

© All Rights Reserved 2024 Theme: Prefer by Template Sell.