Skip to content

Hacking Articles

Raj Chandel’s Blog

  • Courses We Offer
  • CTF Challenges
  • Penetration Testing
  • Web Penetration Testing
  • Red Teaming
  • Donate us
Penetration Testing

Hack Remote Windows PC using Publish-It PUI Buffer Overflow (SEH)

This module exploits a stack based buffer overflow in Publish-It when processing a specially crafted .PUI file. This vulnerability could be exploited by a remote

Penetration Testing

Exploit Remote PC using Adobe Flash Player copy Pixels to ByteArray Integer Overflow

This module exploits an integer overflow in Adobe Flash Player. The vulnerability occurs in the copyPixelsToByteArray method from the BitmapData object. The position field of

Penetration Testing

Exploit Remote PC using Adobe Flash Player PCRE Regex Vulnerability

This module exploits a vulnerability found in Adobe Flash Player. A compilation logic error in the PCRE engine, specifically in the handling of the \c

Penetration Testing

Exploit Remote PC using Adobe Flash Player Byte Array with Workers Use after Free

This module exploits an use after free vulnerability in Adobe Flash Player. The vulnerability occurs when the ByteArray assigned to the current ApplicationDomain is freed

Penetration Testing

Exploit Remote PC using Adobe Flash Player Byte Array Uncompress via ZlibVariant Use after Free

This module exploits an use after free vulnerability in Adobe Flash Player. The vulnerability occurs in the Byte Array::Uncompress ViaZlibVariant method, when trying to uncompress

Penetration Testing

Exploit Remote Windows, Linux, OSX PC using Firefox Proxy Prototype Privileged JavaScript Injection

This exploit gains remote code execution on Firefox 31-34 by abusing a bug in the XPConnect component and gaining a reference to the privileged chrome://

Cyber Forensics

How to find the usage of files in Remote victim PC (Remote PC Forensics)

Today we are going to learn about managing a bunch of files on a remote system using the forfiles command via meterpreter. Table of Content

Penetration Testing

Hack Remote Windows Password using Phishing Login Prompt Exploit

This module is able to perform a phishing attack on the target by popping up a loginprompt. When the user fills credentials in the loginprompt,

Penetration Testing

Hack Remote Windows PC using Achat Unicode SEH Buffer Overflow

This module exploits a Unicode SEH buffer overflow in Achat. By sending a crafted message to the default port 9256/UDP, it’s possible to overwrite the

Posts pagination

Previous 1 … 144 145 146 … 155 Next

Categories

© All Rights Reserved 2024 Theme: Prefer by Template Sell.