Quantcast
Channel: Hacking Articles|Raj Chandel's Blog
Browsing all 1812 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

HackPack - Collection of Hacking Scripts

This is a collection of scripts to add to kali linux. It will create a new menu named Hackpack in your applications menu. It should work on any flavor of Debian, Ubuntu etc. But is made mainly for Kali...

View Article


Image may be NSFW.
Clik here to view.

The State of the Art in Intrusion Prevention and Detection

DownloadPassword: www.hackingarticles.in

View Article


Image may be NSFW.
Clik here to view.

Forensics Investigation of Remote PC (Part 1)

First Hack the Victim PC Using Metasploit (Tutorial How to Hack Remote PC)Once you got the meterpreter session use ‘shell‘command to get command prompt of the target.Now type wmic /? Displays helpwmic...

View Article

Image may be NSFW.
Clik here to view.

Stuxnet 2: under Development by Spy Agencies?

Have you read John le Carre? If you had, you would not be naïve enough to think that the U.S. and Israel would sit idle and watch the Iranian centrifuge machine to go full steam ahead. Gary Samore,...

View Article

Image may be NSFW.
Clik here to view.

Shrink the Partition of Remote Victim PC

First Hack the Victim PC Using Metasploit (Tutorial How to Hack Remote PC)Once you got the meterpreter session use ‘shell ‘command to get command prompt of the target.Type Diskpart in command prompt...

View Article


Image may be NSFW.
Clik here to view.

How to Perform Blue Screen Death Attack on Remote Windows 7 PC

This Metasploit module exploits vulnerability in win32k.sys where under specific conditions TrackPopupMenuEx will pass a NULL pointer to the MNEndMenuState procedure. This Metasploit module has been...

View Article

Image may be NSFW.
Clik here to view.

Hack Remote Windows PC using Easy CD-DA Recorder PLS Buffer Overflow

This module exploits stack-based buffer overflow vulnerability in Easy CD-DA Recorder 2007, caused by a long string in a playlist entry. By persuading the victim to open a specially-crafted .PLS file,...

View Article

Image may be NSFW.
Clik here to view.

Professional Penetration Testing

DownloadPassword: www.hackingarticles.in

View Article


Image may be NSFW.
Clik here to view.

Hack Remote Windows PC using Audiotran PLS File Stack Buffer Overflow

This module exploits a stack-based buffer overflow in Audiotran 1.4.2.4. An attacker must send the file to victim and the victim must open the file. Alternatively, it may be possible to execute code...

View Article


Image may be NSFW.
Clik here to view.

How to Lock Drive of Remote Windows Victim PC

First Hack the Victim PC Using Metasploit (Tutorial How to Hack Remote PC)Once you got the meterpreter session use ‘shell ‘command to get command prompt of the target. Type Cacls (Drive Name) /e /p...

View Article

Image may be NSFW.
Clik here to view.

Forensics Investigation of Remote PC (Part 2)

First Hack the Victim PC Using Metasploit (Tutorial How to Hack Remote PC)Once you got the meterpreter session use ‘shell ‘command to get command prompt of the targetHow to Find System Boot Time and...

View Article

Image may be NSFW.
Clik here to view.

The Basics of Hacking and Penetration Testing, Second Edition

Download

View Article

Image may be NSFW.
Clik here to view.

Investigative Computer Forensics The Practical Guide for Lawyers,...

DownloadPassword: www.hackingarticles.in

View Article


Image may be NSFW.
Clik here to view.

Playing with internet explorer in Remotely Hacked PC

First Hack the Victim PC Using Metasploit (Tutorial How to Hack Remote PC)Once you got the meterpreter session use ‘shell ‘command to get command prompt of the targetDelete Temporary Internet...

View Article

Image may be NSFW.
Clik here to view.

Hack Remote Windows PC using Total Video Player 1.3.1 Buffer Overflow

This Metasploit module exploits a buffer overflow in Total Video Player 1.3.1. The vulnerability occurs opening malformed Settings.ini file e.g."C:\Program Files\Total Video Player\". This Metasploit...

View Article


Image may be NSFW.
Clik here to view.

Hack Internet Explorer in Remote PC set your desired Home page

First Hack the Victim PC Using Metasploit (Tutorial How to Hack Remote PC)Once you got the meterpreter session use ‘shell ‘command to get command prompt of the targetSet Your Desired Website as Home...

View Article

Image may be NSFW.
Clik here to view.

The Basics of Web Hacking Tools and Techniques to Attack the Web

DownloadPassword: www.hackingarticles.in

View Article


Image may be NSFW.
Clik here to view.

Hacking Politics

DownloadPassword: www.hackingarticles.in

View Article

Image may be NSFW.
Clik here to view.

Hack Remote Windows PC using ALLPlayer M3U Buffer Overflow

This Metasploit module exploits a stack-based buffer overflow vulnerability in ALLPlayer 2.8.1, caused by a long string in a playlist entry. By persuading the victim to open a specially-crafted .M3U...

View Article

Image may be NSFW.
Clik here to view.

Bypass UAC Protection of Remote Windows PC in Memory Injection

This module will bypass Windows UAC by utilizing the trusted publisher certificate through process injection. It will spawn a second shell that has the UAC flag turned off. This module uses the...

View Article
Browsing all 1812 articles
Browse latest View live


<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>