HackPack - Collection of Hacking Scripts
This is a collection of scripts to add to kali linux. It will create a new menu named Hackpack in your applications menu. It should work on any flavor of Debian, Ubuntu etc. But is made mainly for Kali...
View ArticleThe State of the Art in Intrusion Prevention and Detection
DownloadPassword: www.hackingarticles.in
View ArticleForensics Investigation of Remote PC (Part 1)
First Hack the Victim PC Using Metasploit (Tutorial How to Hack Remote PC)Once you got the meterpreter session use ‘shell‘command to get command prompt of the target.Now type wmic /? Displays helpwmic...
View ArticleStuxnet 2: under Development by Spy Agencies?
Have you read John le Carre? If you had, you would not be naïve enough to think that the U.S. and Israel would sit idle and watch the Iranian centrifuge machine to go full steam ahead. Gary Samore,...
View ArticleShrink the Partition of Remote Victim PC
First Hack the Victim PC Using Metasploit (Tutorial How to Hack Remote PC)Once you got the meterpreter session use ‘shell ‘command to get command prompt of the target.Type Diskpart in command prompt...
View ArticleHow to Perform Blue Screen Death Attack on Remote Windows 7 PC
This Metasploit module exploits vulnerability in win32k.sys where under specific conditions TrackPopupMenuEx will pass a NULL pointer to the MNEndMenuState procedure. This Metasploit module has been...
View ArticleHack Remote Windows PC using Easy CD-DA Recorder PLS Buffer Overflow
This module exploits stack-based buffer overflow vulnerability in Easy CD-DA Recorder 2007, caused by a long string in a playlist entry. By persuading the victim to open a specially-crafted .PLS file,...
View ArticleHack Remote Windows PC using Audiotran PLS File Stack Buffer Overflow
This module exploits a stack-based buffer overflow in Audiotran 1.4.2.4. An attacker must send the file to victim and the victim must open the file. Alternatively, it may be possible to execute code...
View ArticleHow to Lock Drive of Remote Windows Victim PC
First Hack the Victim PC Using Metasploit (Tutorial How to Hack Remote PC)Once you got the meterpreter session use ‘shell ‘command to get command prompt of the target. Type Cacls (Drive Name) /e /p...
View ArticleForensics Investigation of Remote PC (Part 2)
First Hack the Victim PC Using Metasploit (Tutorial How to Hack Remote PC)Once you got the meterpreter session use ‘shell ‘command to get command prompt of the targetHow to Find System Boot Time and...
View ArticleInvestigative Computer Forensics The Practical Guide for Lawyers,...
DownloadPassword: www.hackingarticles.in
View ArticlePlaying with internet explorer in Remotely Hacked PC
First Hack the Victim PC Using Metasploit (Tutorial How to Hack Remote PC)Once you got the meterpreter session use ‘shell ‘command to get command prompt of the targetDelete Temporary Internet...
View ArticleHack Remote Windows PC using Total Video Player 1.3.1 Buffer Overflow
This Metasploit module exploits a buffer overflow in Total Video Player 1.3.1. The vulnerability occurs opening malformed Settings.ini file e.g."C:\Program Files\Total Video Player\". This Metasploit...
View ArticleHack Internet Explorer in Remote PC set your desired Home page
First Hack the Victim PC Using Metasploit (Tutorial How to Hack Remote PC)Once you got the meterpreter session use ‘shell ‘command to get command prompt of the targetSet Your Desired Website as Home...
View ArticleThe Basics of Web Hacking Tools and Techniques to Attack the Web
DownloadPassword: www.hackingarticles.in
View ArticleHack Remote Windows PC using ALLPlayer M3U Buffer Overflow
This Metasploit module exploits a stack-based buffer overflow vulnerability in ALLPlayer 2.8.1, caused by a long string in a playlist entry. By persuading the victim to open a specially-crafted .M3U...
View ArticleBypass UAC Protection of Remote Windows PC in Memory Injection
This module will bypass Windows UAC by utilizing the trusted publisher certificate through process injection. It will spawn a second shell that has the UAC flag turned off. This module uses the...
View Article