Skip to content

Hacking Articles

Raj Chandel's Blog

  • Courses We Offer
  • CTF Challenges
  • Penetration Testing
  • Web Penetration Testing
  • Red Teaming
  • Donate us
Penetration Testing

Hack Remote Windows 7 PC using Chasys Draw IES Buffer Overflow

This module exploits a buffer overflow vulnerability found in Chasys Draw IES (version 4.10.01). The vulnerability exists in the module flt_BMP.dll, whileparsing BMP files, where

Penetration Testing

Bypass Antivirus and Hack Remote Windows PC with Syringe

First Download syringe-antivirus-bypass from Here Now untar the file tar xvf syringe.tar Now you can start it with ./syringe.sh After we successfully generate the malicious exe

Penetration Testing

Hack Remote Windows PC using Apple Quicktime 7 Invalid Atom Length Buffer Overflow

This module exploits a stack buffer overflow in Cyber Link Power2Go version 8.x the vulnerability is triggered when opening a malformed p2g file containing an

Penetration Testing

Exploit Remote Windows PC using Corel PDF Fusion Stack Buffer Overflow

This module exploits stack-based buffer overflow vulnerability in version 1.11 of Corel PDF Fusion. The vulnerability exists while handling a XPS file with long entry

Penetration Testing

Hack Windows 7 PC Remotely using MediaCoder .M3U Buffer Overflow

This module exploits a buffer overflow in MediaCoder 0.8.22. The vulnerability occurs when adding an .m3u, allowing arbitrary code execution under the context of the

Penetration Testing

Hack Windows 7 PC Remotely using ERS Viewer 2013 ERS File Handling Buffer Overflow

This module exploits a buffer overflow vulnerability found in ERS Viewer 2013. The vulnerability exists in the module ermapper_u.dll, where the function rf_report_error handles user

Penetration Testing

Hack Remote Windows PC using ABBS Audio Media Player .LST Buffer Overflow

This module exploits a buffer overflow in ABBS Audio Media Player. The vulnerability occurs when adding an .lst, allowing arbitrary code execution with the privileges

Penetration Testing

Hack Windows, Linux or MAC PC using Java Applet Provider Skeleton Insecure Invoke Method

This module abuses the insecure invoke () method of the Provider Skeleton class that allows to call arbitrary static methods with user supplied arguments. The

Penetration Testing

Hack Windows PC using Novell Client 4.91 SP4 nwfs.sys Local Privilege Escalation

This module exploits a flaw in the nwfs.sys driver to overwrite data in kernel space. The corruption occurs while handling ioctl requests with code 0x1438BB,

Posts pagination

Previous 1 … 147 148 149 … 151 Next

Categories

© All Rights Reserved 2024 Theme: Prefer by Template Sell.