Skip to content

Hacking Articles

Raj Chandel’s Blog

  • Courses We Offer
  • CTF Challenges
  • Penetration Testing
  • Web Penetration Testing
  • Red Teaming
  • Donate us
Penetration Testing

Hack Remote PC using Wireshark wiretap/mpeg.c Stack Buffer Overflow

This module triggers a stack buffer overflow in Wireshark <= 1.8.12/1.10.5 by generating a malicious file.) Exploit Targets Wireshark <= 1.8.12/1.10.5 Requirement Attacker: kali Linux

Penetration Testing

Hack Remote Victim PC with MS Office Document

This module creates a malicious RTF file that when opened in vulnerable versions of Microsoft Word will lead to code execution. The flaw exists in

Penetration Testing

Set New Password of Victim PC Remotely

This module will attempt to change the password of the targeted account. The typical usage is to change a newly created account’s password on a

Penetration Testing

Hack Remote Windows PC using WinRAR Filename Spoofing

This module abuses a filename spoofing vulnerability in WinRAR. The vulnerability exists when opening ZIP files. The file names showed in WinRAR when opening a

Penetration Testing

How to Gather Skype Logs, Firefox History and Chrome history of Remote Victim PC

Gathers Skype chat logs, Firefox history, and Chrome history data from the target machine. Exploit Targets Windows 7 Requirement Attacker: kali Linux Victim PC: Windows

Others

Hack ALL Games in Windows 7 for Instant Win (Enable Debug Mode)

Step1:- Download Resource Hacker from Here Step2:- Open Resource Hacker and click open. Step3:- Now Open C:\Program Files\Microsoft Games\Solitaire\en-US and drag and drop Solitaire.exe.mui in resource hacker You’ll

Penetration Testing

Hack Remote Windows PC using ALLPlayer M3U Buffer Overflow

This Metasploit module exploits a stack-based buffer overflow vulnerability in ALLPlayer 2.8.1, caused by a long string in a playlist entry. By persuading the victim

Penetration Testing

Hack Remote Windows PC using Total Video Player 1.3.1 Buffer Overflow

This Metasploit module exploits a buffer overflow in Total Video Player 1.3.1. The vulnerability occurs opening malformed Settings.ini file e.g.”C:\Program Files\Total Video Player\”. This Metasploit

Penetration Testing

How to Lock Drive of Remote Windows Victim PC

First Hack the Victim PC Using Metasploit (Tutorial How to Hack Remote PC) Once you got the meterpreter session use ‘shell ‘command to get command prompt of the target.

Posts pagination

Previous 1 … 148 149 150 … 155 Next

Categories

© All Rights Reserved 2024 Theme: Prefer by Template Sell.