Skip to content

Hacking Articles

Raj Chandel’s Blog

  • Courses We Offer
  • CTF Challenges
  • Penetration Testing
  • Web Penetration Testing
  • Red Teaming
  • Donate us
Penetration Testing

Hack Windows PC using Novell Client 4.91 SP4 nwfs.sys Local Privilege Escalation

This module exploits a flaw in the nwfs.sys driver to overwrite data in kernel space. The corruption occurs while handling ioctl requests with code 0x1438BB,

Penetration Testing

Exploit Windows, Linux or MAC PC using Java Applet Driver Manager Privileged toString() Remote Code Execution

This module abuses the java.sql.DriverManager class where the toString() method is called over user supplied classes from a doPrivileged block. The vulnerability affects Java version

Penetration Testing

Hack Remote PC using Sun Java Web Start Double Quote Injection

This module exploits a flaw in the Web Start component of the Sun Java Runtime Environment. Parameters initial-heap-size and max-heap-size in a JNLP file can

Penetration Testing

Hack Windows PC using Java CMM Remote Code Execution

This module abuses the Color Management classes from a Java Applet to run arbitrary Java code outside of the sandbox as exploited in the wild

Penetration Testing

Bypassing Antivirus using Multi Pyinjector Shell Code Injection in SET Toolkit

Open your backtrack terminal & Type cd /pentest/exploits/set Now Open Social Engineering Toolkit (SET). /set Now we will choose option 5, “Update the Social-Engineering Toolkit” Now we will

Penetration Testing

How to Install BeEF in Windows PC

BeEF is short for The Browser Exploitation Framework. It is a penetration testing tool that focuses on the web browser. BeEF is pioneering techniques that

Cryptography & Steganography

How to Hide Text behind Text

Introducing a very simple yet rarely known method of securing textual information: whitespace steganography hide text. This technique allows you to hide a text file

Cryptography & Steganography

How to Hide Text File Behind MP3 (OpenPuff Tutorial)

OpenPuff is a handy application that allows you to hide data into encrypted files in order to send it to other users. The program can

Hacking Tools, Penetration Testing

Subterfuge (Man-in-the-Middle Attack Framework)

Subterfuge is a Framework to take the arcane art of Man-in-the-Middle Attack and make it as simple as point and shoot. A beautiful, easy to

Posts pagination

Previous 1 … 152 153 154 155 Next

Categories

© All Rights Reserved 2024 Theme: Prefer by Template Sell.