Hack Remote PC using Open Office Exploit
Open Office OLE Importer Document Summary Information Stream Handling Overflow This module exploits vulnerability in OpenOffice 2.3.1 and 2.3.0 on Microsoft Windows XP SP3. By supplying an OLE file...
View ArticleGet Admin Privilege of Remote Victim PC using Windows SYSTEM Escalation via...
This module will create a new session with SYSTEM privileges via the KiTrap0D exploit by Tavis Ormandy. If the session is use is already elevated then the exploit will not run. The module relies on...
View ArticleHack Remote PC Using MJM QuickPlayer 1.00 Beta 60a / QuickPlayer 2010 .s3m...
This module exploits a stack buffer overflow in MJM QuickPlayer 1.00 beta 60a and QuickPlayer 2010 (Multi-target exploit). When opening a malicious s3m file in one of these 2 applications, a stack...
View ArticleExploit PC in LAN using Shadow Stream Recorder 3.0.1.7 Buffer Overflow
This module exploits a buffer overflow in Shadow Stream Recorder 3.0.1.7. Using the application to open a specially crafted asx file, a buffer overflow may occur to allow arbitrary code execution under...
View ArticleHack PC in Network using MJM Core Player 2011 .s3m Stack Buffer Overflow
This module exploits a stack buffer overflow in MJM Core Player 2011 when opening a malicious s3m file in this applications, a stack buffer overflow can be triggered, resulting in arbitrary code...
View ArticleHacked Remote PC Using Digital Music Pad Version 8.2.3.3.4 Stack Buffer Overflow
This module exploits a buffer overflow in Digital Music Pad Version 8.2.3.3.4 when opening a malicious pls file with the Digital Music Pad, a remote attacker could overflow a buffer and execute...
View ArticleHacked Remote PC Using Cool PDF Image Stream Buffer Overflow
This module exploits a stack buffer overflow in Cool PDF Reader prior to version 3.0.2.256. The vulnerability is triggered when opening a malformed PDF file that contains a specially crafted image...
View ArticleCEH V8 Course + Lab Manual
Download Password: www.hackingarticles.in The post CEH V8 Course + Lab Manual appeared first on Hacking Articles.
View ArticleHack Remote PC with Windows EPATHOBJ::pprFlattenRec Local Privilege Escalation
This module exploits vulnerability on EPATHOBJ::pprFlattenRec due to the usage of uninitialized data which allows to corrupt memory. At the moment, the module has been tested successfully on Windows XP...
View ArticleHow to Send Encrypted Mail through Gmail (Secure Gmail by Streak)
Secure Gmail encrypts and decrypts emails you send in Gmail. This happens all on your machine, and the unencrypted text never reaches Google servers. This is useful if you don’t want anyone but the...
View ArticleHow to Broadcast YouTube Video in Remote Windows,Linux or MAC System
This module will broadcast a Youtube video on all compromised systems. It will play the video in the target machine’s native browser in full screen mode. The VID datastore option is the “v” parameter...
View ArticleHack Remote PC Using Adobe Reader ToolButton Use After Free
This module exploits an use after free condition on Adobe Reader versions 11.0.2, 10.1.6 and 9.5.4 and prior. The vulnerability exists while handling the ToolButton object, where the cEnable callback...
View ArticleHacking Raspberry Pi 2013
Download The post Hacking Raspberry Pi 2013 appeared first on Hacking Articles.
View ArticleHack Remote PC Using Real Networks RealPlayer Version Attribute Buffer Overflow
This module exploits a stack-based buffer overflow vulnerability in version 16.0.3.51 and 16.0.2.32 of RealNetworks RealPlayer, caused by improper bounds checking of the version and encoding attributes...
View ArticleHack Remote Windows 7 PC Using IBM Forms Viewer Unicode Buffer Overflow
This module exploits a stack-based buffer overflow in IBM Forms Viewer. The vulnerability is due to a dangerous usage of strcpy-like function, and occurs while parsing malformed XFDL files, with a long...
View ArticleHack Remote Windows 7 PC Using IBM Forms Viewer Unicode Buffer Overflow
This module exploits a stack-based buffer overflow in IBM Forms Viewer. The vulnerability is due to a dangerous usage of strcpy-like function, and occurs while parsing malformed XFDL files, with a long...
View ArticleEmail spoofing: The story of “Congratulations you have won a lottery” like...
Mail vs E-mail Back in old days when internet was not so common, we had to rely only on the postal/courier services. The only thing that bugs me about the traditional mail is their speed. This is when...
View ArticleRemotely Scan Malware/Virus in Victim PC with Metasploit
This module will check a file for malware on VirusTotal based on the checksum. Exploit Targets Windows 7 Windows XP Requirement Attacker: Kali Linux Victim PC: Windows 7 Open Kali Linux terminal type...
View ArticlePenetration Testing Procedures & Methodologies
Download Password: www.hackingarticles.in The post Penetration Testing Procedures & Methodologies appeared first on Hacking Articles.
View ArticleBest of VLC Media Player Tricks (Part 1)
How to Cut the Audio and Video using VLC Player Open the VLC media player. Go to the menu bar .From the View tab, select Advanced Controls. We can see the Record button in the left bottom of the player...
View Article