Hack Remote Windows PC using ABBS Audio Media Player .LST Buffer Overflow
This module exploits a buffer overflow in ABBS Audio Media Player. The vulnerability occurs when adding an .lst, allowing arbitrary code execution with the privileges of the user running the...
View ArticleHack Gmail Password using Hydra in kali Linux
Open your Kali Linux terminal and Type xhydra and press enter You can also do this manually. First Open Your Kali Linux and Follow this path Kali Linux->Passwords Attacks->Online...
View ArticleHack Windows 7 PC Remotely using ERS Viewer 2013 ERS File Handling Buffer...
This module exploits a buffer overflow vulnerability found in ERS Viewer 2013. The vulnerability exists in the module ermapper_u.dll, where the function rf_report_error handles user provided data in a...
View ArticleHack Windows 7 PC Remotely using MediaCoder .M3U Buffer Overflow
This module exploits a buffer overflow in MediaCoder 0.8.22. The vulnerability occurs when adding an .m3u, allowing arbitrary code execution under the context of the user. DEP bypass via ROP is...
View ArticleExploit Remote Windows PC using Corel PDF Fusion Stack Buffer Overflow
This module exploits stack-based buffer overflow vulnerability in version 1.11 of Corel PDF Fusion. The vulnerability exists while handling a XPS file with long entry names. In order for the payload to...
View ArticleHack Remote Windows PC using Apple Quicktime 7 Invalid Atom Length Buffer...
This module exploits a stack buffer overflow in Cyber Link Power2Go version 8.x the vulnerability is triggered when opening a malformed p2g file containing an overly long string in the ‘name’ attribute...
View ArticleBypass Antivirus and Hack Remote Windows PC with Syringe
First Download syringe-antivirus-bypass from Here Now untar the file tar xvf syringe.tar Now you can start it with ./syringe.sh After we successfully generate the malicious exe File, it will stored on...
View ArticleXSSF Cross-Site Scripting Framework in Metasploit (Part 1)
The Cross-Site Scripting Framework (XSSF) is a security tool designed to turn the XSS vulnerability exploitation task into a much easier work. The XSSF project aims to demonstrate the real dangers of...
View ArticleHack Remote Windows 7 PC using Chasys Draw IES Buffer Overflow
This module exploits a buffer overflow vulnerability found in Chasys Draw IES (version 4.10.01). The vulnerability exists in the module flt_BMP.dll, whileparsing BMP files, where the ReadFile function...
View ArticleHack FTP Remotely using Open-FTPD 1.2 Arbitrary File Upload
This module exploits multiple vulnerabilities found in Open Compact FTP server. The software contains authentication bypass vulnerability and a arbitrary file upload vulnerability that allows a remote...
View ArticleHack Remote PC, IPhone, Android using XSSF in Metasploit
First install XSSF in metasploit, please refer the following link “http://www.hackingarticles.in/xssf-cross-site-scripting-framework-in-metasploit/ ” Now use the following command In metasploit to...
View ArticleExploit Windows PC using Ultra Mini HTTPD Stack Buffer Overflow
This module exploits a stack based buffer overflow in Ultra Mini HTTPD 1.21 allowing remote attackers to execute arbitrary code via a long resource name in an HTTP request Exploit Targets Ultra Mini...
View ArticleHack Remote PC using MiniWeb (Build 300) Arbitrary File Upload
This module exploits a vulnerability in MiniWeb HTTP server (build 300).The software contains a file upload vulnerability that allows an unauthenticated remote attacker to write arbitrary files to the...
View ArticleHack Remote PC using Intrasrv 1.0 Buffer Overflow
This module exploits a boundary condition error in Intrasrv Simple Web Server 1.0. The web interface does not validate the boundaries of an HTTP request string prior to copying the data to an...
View ArticleHack Remote Windows or Linux PC with Java store Image Array() Invalid Array...
This module abuses an Invalid Array Indexing Vulnerability on the static function storeImageArray() function in order to produce a memory corruption and finally escape the Java Sandbox. The...
View ArticleExploit Remote Windows PC using Firefox XMLSerializer Use After Free
This module exploits a vulnerability found on Firefox 17.0 (< 17.0.2), specifically an use after free of an Element object, when using the serializeToStream method with a specially crafted...
View ArticleBest of Mozilla Firefox Hacking Exploits
Firefox XMLSerializer Use After Free Mozilla Firefox Bootstrapped Addon Social Engineering Code Execution Firefox 8/9 AttributeChildRemoved() Use-After-Free Firefox 7/8 (<= 8.0.1) nsSVGValue...
View ArticleHack Remote Windows PC Using A-PDF WAV to MP3 v1.0.0 Buffer Overflow
This module exploits a buffer overflow in A-PDF WAV to MP3 v1.0.0. When the application is used to import a specially crafted m3u file, a buffer overflow occurs allowing arbitrary code execution...
View ArticleHack Remote Windows PC Using PCMAN FTP Server Post-Authentication STOR...
This Metasploit module exploits a buffer overflow vulnerability found in the STOR command of the PCMAN FTP version 2.07 server when the “/../” parameters are also sent to the server. Please note...
View ArticleHack PC in Network Using Microsoft Windows Theme File Handling Arbitrary Code...
This Metasploit module exploits a vulnerability mainly affecting Microsoft Windows XP and Windows 2003. The vulnerability exists in the handling of the Screen Saver path, in the [boot] section. An...
View Article