Skip to content
Hacking Articles

Recent Posts

  • AWS EC2 Credentials Theft via SSRF Abuse
  • Privacy Protection: Encrypted Notebooks
  • Privacy Protection: File Sharing
  • Privacy Protection: File Encryption
  • Credential Dumping with NetExec (nxc)

Most Used Categories

  • CTF Challenges (504)
    • VulnHub (311)
    • HackTheBox (164)
  • Penetration Testing (408)
  • Red Teaming (125)
  • Website Hacking (64)
  • Cyber Forensics (68)
  • Privilege Escalation (59)
  • Hacking Tools (33)
  • Pentest Lab Setup (29)

Hacking Articles

Raj Chandel's Blog

  • Courses We Offer
  • CTF Challenges
  • Penetration Testing
  • Web Penetration Testing
  • Red Teaming
  • Donate us
Penetration Testing

Hacked Remote PC Using Digital Music Pad Version 8.2.3.3.4 Stack Buffer Overflow

December 11, 2013May 27, 2025 by Raj

This module exploits a buffer overflow in Digital Music Pad Version 8.2.3.3.4 when opening a malicious pls file with the Digital Music Pad, a remote

Penetration Testing

Hack PC in Network using MJM Core Player 2011 .s3m Stack Buffer Overflow

December 11, 2013May 27, 2025 by Raj

This module exploits a stack buffer overflow in MJM Core Player 2011 when opening a malicious s3m file in this applications, a stack buffer overflow

Penetration Testing

Exploit PC in LAN using Shadow Stream Recorder 3.0.1.7 Buffer Overflow

December 11, 2013May 27, 2025 by Raj

This module exploits a buffer overflow in Shadow Stream Recorder 3.0.1.7. Using the application to open a specially crafted asx file, a buffer overflow may

Penetration Testing

Hack Remote PC Using MJM QuickPlayer 1.00 Beta 60a / QuickPlayer 2010 .s3m Stack Buffer Overflow

December 11, 2013May 27, 2025 by Raj

This module exploits a stack buffer overflow in MJM QuickPlayer 1.00 beta 60a and QuickPlayer 2010 (Multi-target exploit). When opening a malicious s3m file in

Penetration Testing

Hack Remote PC Using Beetel Connection Manager Net Config.ini Buffer Overflow

October 30, 2013May 27, 2025 by Raj

This module exploits a stack-based buffer overflow on Beetel Connection Manager. The vulnerability exists in the parising of the UserName parameter in the NetConfig.ini file.

Penetration Testing

Hack PC in Network Using Microsoft Windows Theme File Handling Arbitrary Code Execution

September 21, 2013May 27, 2025 by Raj

This Metasploit module exploits a vulnerability mainly affecting Microsoft Windows XP and Windows 2003. The vulnerability exists in the handling of the Screen Saver path,

Penetration Testing

Hack Remote Windows PC Using A-PDF WAV to MP3 v1.0.0 Buffer Overflow

September 20, 2013May 27, 2025 by Raj

This module exploits a buffer overflow in A-PDF WAV to MP3 v1.0.0. When the application is used to import a specially crafted m3u file, a

Penetration Testing

Exploit Remote Windows PC using Firefox XMLSerializer Use After Free

August 29, 2013May 27, 2025 by Raj

This module exploits a vulnerability found on Firefox 17.0 (< 17.0.2), specifically an use after free of an Element object, when using the serializeToStream method

Penetration Testing

Hack Remote Windows or Linux PC with Java store Image Array() Invalid Array Indexing Vulnerability

August 16, 2013May 27, 2025 by Raj

This module abuses an Invalid Array Indexing Vulnerability on the static function storeImageArray() function in order to produce a memory corruption and finally escape the

Posts pagination

Previous 1 … 148 149 150 … 153 Next

Categories

© All Rights Reserved 2024 Theme: Prefer by Template Sell.