Skip to content

Hacking Articles

Raj Chandel's Blog

  • Courses We Offer
  • CTF Challenges
  • Penetration Testing
  • Web Penetration Testing
  • Red Teaming
  • Donate us
Penetration Testing

Remotely Scan Malware/Virus in Victim PC with Metasploit

This module will check a file for malware on VirusTotal based on the checksum. Exploit Targets Windows 7 Windows XP Requirement Attacker: Kali Linux Victim

Penetration Testing

Hack Remote PC Using Real Networks RealPlayer Version Attribute Buffer Overflow

This module exploits a stack-based buffer overflow vulnerability in version 16.0.3.51 and 16.0.2.32 of RealNetworks RealPlayer, caused by improper bounds checking of the version and

Penetration Testing

Hack Remote PC Using Adobe Reader ToolButton Use After Free

This module exploits an use after free condition on Adobe Reader versions 11.0.2, 10.1.6 and 9.5.4 and prior. The vulnerability exists while handling the ToolButton

Penetration Testing

How to Broadcast YouTube Video in Remote Windows,Linux or MAC System

This module will broadcast a Youtube video on all compromised systems. It will play the video in the target machine’s native browser in full screen

Penetration Testing

Hacked Remote PC Using Cool PDF Image Stream Buffer Overflow

This module exploits a stack buffer overflow in Cool PDF Reader prior to version 3.0.2.256. The vulnerability is triggered when opening a malformed PDF file

Penetration Testing

Hack Remote PC using Open Office Exploit

This module exploits vulnerability in OpenOffice 2.3.1 and 2.3.0 on Microsoft Windows XP SP3. By supplying an OLE file with a malformed Document Summary Information

Penetration Testing

Hacked Remote PC Using Digital Music Pad Version 8.2.3.3.4 Stack Buffer Overflow

This module exploits a buffer overflow in Digital Music Pad Version 8.2.3.3.4 when opening a malicious pls file with the Digital Music Pad, a remote

Penetration Testing

Hack PC in Network using MJM Core Player 2011 .s3m Stack Buffer Overflow

This module exploits a stack buffer overflow in MJM Core Player 2011 when opening a malicious s3m file in this applications, a stack buffer overflow

Penetration Testing

Exploit PC in LAN using Shadow Stream Recorder 3.0.1.7 Buffer Overflow

This module exploits a buffer overflow in Shadow Stream Recorder 3.0.1.7. Using the application to open a specially crafted asx file, a buffer overflow may

Posts pagination

Previous 1 … 146 147 148 … 152 Next

Categories

© All Rights Reserved 2024 Theme: Prefer by Template Sell.