Skip to content

Hacking Articles

Raj Chandel’s Blog

  • Courses We Offer
  • CTF Challenges
  • Penetration Testing
  • Web Penetration Testing
  • Red Teaming
  • Donate us
Penetration Testing

Metasploit Tutorial for Beginners (Part 1)

The Metasploit project is an open-source penetration testing platform that enables you to find and exploit vulnerabilities. In 2003, H.D. Moore created Metasploit as a

Cyber Forensics

How to Collect Telephonic Evidence for Forensic in Victim PC

Dump it Tool utility is used to generate a physical memory dump of Windows machines. It works with both x86 (32-bits) and x64 (64-bits) machines.

Penetration Testing

Exploit Windows PC using BulletProof FTP Client BPS Buffer Overflow

This module exploits stack-based buffer overflow vulnerability in BulletProof FTP Client 2010, caused by an overly long hostname. By persuading the victim to open a

Penetration Testing

Exploit Remote Windows PC using i-FTP Schedule Buffer Overflow

This module exploits stack-based buffer overflow vulnerability in i-Ftp v2.20, caused by a long time value set for scheduled download. By persuading the victim to

Cyber Forensics

How to Collect Email Evidence in Victim PC (Email Forensics)

Dump it Tool utility is used to generate a physical memory dump of Windows machines. It works with both x86 (32-bits) and x64 (64-bits) machines.

Cyber Forensics

Forensics Analysis of Social Media Sites like Facebook, Twitter, LinkedIn

Dump it Tool utility is used to generate a physical memory dump of Windows machines. It works with both x86 (32-bits) and x64 (64-bits) machines.

CTF Challenges, VulnHub

Xerxes: 1 Vulnhub Walkthrough

Welcome to another boot2root CTF challenge “Xerxes: 1” uploaded by bas on vulnhub. As, there is a theme, and you will need to snag the

Penetration Testing

Hack Saved LastPass Master Password in Remote Windows, Linux, MAC PC

This module extracts and decrypts LastPass master login accounts and passwords Exploit Targets lastpass Requirement Attacker: kali Linux Victim PC: Windows 7 Open Kali terminal

Penetration Testing

Hack Remote Windows PC using Windows Track Popup Menu Win32k NULL Pointer Dereference

This module exploits a NULL Pointer Dereference in win32k.sys, the vulnerability can be triggered through the use of TrackPopupMenu. Under special conditions, the NULL pointer

Posts pagination

Previous 1 … 145 146 147 … 155 Next

Categories

© All Rights Reserved 2024 Theme: Prefer by Template Sell.