Hack Remote Windows PC using Wing FTP Server Authenticated Command Execution
This module exploits the embedded Lua interpreter in the admin web interface for versions 4.3.8 and below. When supplying a specially crafted HTTP POST request an attacker can use os.execute() to...
View ArticleHow to Gather Applied Patches in Remote Windows PC
This module will attempt to enumerate which patches are applied to a windows system based on the result of the WMI query: SELECT HotFixID FROM Win32_QuickFixEngineering Exploit Targets Windows 7...
View ArticleHack Remote Windows PC using BadBlue Exploit
BadBlue is software which can use for photos, videos, music, and business files with friends and colleagues instantly. First scan badblue service the victim pc using nmap –sV 192.168.1.2 Open Kali...
View ArticleHack Remote Windows PC using BadBlue Exploit
BadBlue is software which can use for photos, videos, music, and business files with friends and colleagues instantly. First scan badblue service the victim pc using nmap –sV 192.168.1.2 Now type use...
View ArticleHack Remote Windows PC using Windows Track Popup Menu Win32k NULL Pointer...
This module exploits a NULL Pointer Dereference in win32k.sys, the vulnerability can be triggered through the use of TrackPopupMenu. Under special conditions, the NULL pointer dereference can be abused...
View ArticleHack Saved LastPass Master Password in Remote Windows, Linux, MAC PC
This module extracts and decrypts LastPass master login accounts and passwords Exploit Targets lastpass Requirement Attacker: kali Linux Victim PC: Windows 7 Open Kali terminal type msfconsole Now type...
View ArticleHack the Password in Plain text of Remote Windows PC
First Hack the Victim PC Using Metasploit (Tutorial How to Hack Remote PC) Once you had a remote shell with Metasploit all now use the Bypass UAC module, set the session number and exploit it use...
View ArticleHack Remote Windows PC using Windows Client Copy Image Win32k Exploit
This module exploits improper object handling in the win32k.sys kernel mode driver. This module has been tested on vulnerable builds of Windows 7 x64 and x86, and Windows 2008 R2 SP1 x64.. Exploit...
View ArticleHack Browsers, Chat, Databases, Mails, Wifi Password in Remote Windows or...
First Hack the Victim PC Using Metasploit (Tutorial How to Hack Remote PC) Once you got the meterpreter session use ‘shell ‘command to get command prompt of the target Now download LaZagne project from...
View ArticleHack Remote Windows PC using Adobe Flash Player Drawing Fill Shader Memory...
This module exploits a memory corruption happening when applying a Shader as a drawing fill as exploited in the wild on June 2015. This module has been tested successfully on: Windows 7 SP1 (32-bit),...
View ArticleHack Remote PC using Adobe Flash Player Nellymoser Audio Decoding Buffer...
This module exploits a buffer overflow on Adobe Flash Player when handling nellymoser encoded audio inside a FLV video, as exploited in the wild on June 2015. This module has been tested successfully...
View ArticleBypass Antivirus and Hack Remote Windows PC with shelter
Download Shellter from here, shellter version 4.0 is latest release,no antivirus has detected till now. After downloading shellter unzip the archive file set the location of shellter and type...
View ArticleHow to Gather WIFI Password in Remote Windows PC
First Hack the Victim PC Using Metasploit (Tutorial How to Hack Remote PC) Once you got the meterpreter session use ‘shell ‘command to get command prompt of the target PC. Now to see wireless Network...
View ArticleHack Windows or Linux PC using Adobe Flash opaque Background Use After Free
This module exploits an use after free on Adobe Flash Player. The vulnerability, discovered by Hacking Team and made public on its July 2015 data leak, was described as an Use After Free while handling...
View ArticleHack Windows or Linux PC using Adobe Flash Player ByteArray Use After Free
This module exploits a use after free on Adobe Flash Player. The vulnerability, discovered by Hacking Team and made public on its July 2015 data leak, was described as a Use After Free while handling...
View ArticleMagic Unicorn – PowerShell Downgrade Attack and Exploitation tool
Magic Unicorn is a simple tool for using a PowerShell downgrade attack and injects shellcode straight into memory. Based on Matthew Graeber’s powershell attacks and the powershell bypass technique...
View ArticleHack Remote Windows PC using Video Charge Studio Buffer Overflow (SEH)
This module exploits a stack based buffer overflow in VideoCharge Studio 2.12.3.685 when processing a specially crafted .VSC file. This vulnerability could be exploited by a remote attacker to execute...
View ArticleWindows 7 Sticky Key Hack Attack using Metasploit
This module makes it possible to apply the ‘sticky keys’ hack to a session with appropriate rights. The hack provides a means to get a SYSTEM shell using UI-level interaction at an RDP login screen or...
View ArticleHack Remote PC using Firefox PDF.js Privileged Javascript Injection
This module gains remote code execution on Firefox 35-36 by abusing a privilege escalation bug in resource:// URIs. PDF.js is used to exploit the bug. This exploit requires the user to click anywhere...
View ArticleHow to Hack Saved sessions in Putty using Metasploit
This module will identify whether Pageant (PuTTY Agent) is running and obtain saved session information from the registry. PuTTY is very configurable; some users may have configured saved sessions...
View Article