Hack Remote Windows PC using MS15-100 Microsoft Windows Media Center MCL...
This module exploits vulnerability in Windows Media Center. By supplying an UNC path in the *.mcl file, a remote file will be automatically downloaded, which can result in arbitrary code execution....
View ArticleHack Remote Windows PC using Konica Minolta FTP Utility 1.00 Post Auth CWD...
This module exploits an SEH overflow in Konica Minolta FTP Server 1.00. Konica Minolta FTP fails to check input size when parsing ‘CWD’ commands, which leads to an SEH overflow. Konica FTP allows...
View ArticleHack Remote Windows PC using PDF Shaper Buffer Overflow
PDF Shaper is prone to security vulnerability when processing PDF files. The vulnerability appear when we use Convert PDF to Image and use a specially crafted PDF file. This Metasploit module has been...
View ArticleHow to show all Possible Exploits in Victim PC using Windows-Exploit-Suggester
This tool compares a targets patch levels against the Microsoft vulnerability database in order to detect potential missing patches on the target. It also notifies the user if there are public exploits...
View ArticleHack Remote PC using Pupy – Remote Administration Tool
Pupy is a remote administration tool with an embedded Python interpreter, allowing its modules to load python packages from memory and transparently access remote python objects. The payload is a...
View ArticleHack Remote PC using Watermark Master Buffer Overflow (SEH)
This module exploits a stack based buffer overflow in Watermark Master 2.2.23 when processing a specially crafted .WCF file. This vulnerability could be exploited by a remote attacker to execute...
View ArticleHack Android Phone WhatsApp and all Directories using Mercury Browser...
This module exploits an unsafe intent URI scheme and directory traversal found in Android Mercury Browser version 3.2.3. The intent allows the attacker to invoke a private WIFI manager activity, which...
View ArticleHow to Hack Windows Wallpaper of Remote PC
First Hack the Victim PC Using Metasploit (Tutorial How to Hack Remote PC) Once you got the meterpreter session to send an image file to the victim system use the upload command Use ‘shell ‘command to...
View ArticleHack Remote Windows PC using Script Web Delivery
This module quickly fires up a web server that serves a payload. The provided command will start the specified scripting language interpreter and then download and execute the payload. The main purpose...
View ArticleHacking with Empire – PowerShell Post-Exploitation Agent
Empire is a pure PowerShell post-exploitation agent built on cryptologically-secure communications and a flexible architecture. Empire implements the ability to run PowerShell agents without needing...
View ArticleHack Remote PC using Fake Updates Scam with Ettercap and Metasploit
First of all, go to Kali Linux Home directory. Move to etc /ettercap directory. Now edit etter.dns File. Modify the contents of the etter.dns and add your own pc IP address as A record. Now run the...
View ArticleHack Remote Windows PC using The Backdoor factory with Metasploit
The goal of BDF is to patch executable binaries with user desired shellcode and continue normal execution of the prepatched state. First of all download the-backdoor-factory-master from here. Now unzip...
View ArticleHack Remote PC using WinRAR SFX Remote Code Execution Vulnerability
Remote code execution vulnerability has been discovered in the official WInRAR SFX v5.21 software.The vulnerability allows remote attackers to unauthorized execute system specific code to compromise a...
View ArticleSession Hijacking using Ettercap, Hamster and Ferret (A Beginner Guide)
From Wikipedia Session hijacking, sometimes also known as cookie hijacking is the exploitation of a valid computer session—sometimes also called session key—to gain unauthorized access to information...
View ArticleHack Windows Password in Clear Text using Mimikatz
mimikatz is a tool to check Windows security. It’s now well known to extract plaintexts passwords, hash, PIN code and kerberos tickets from memory. mimikatz can also perform pass-the-hash,...
View ArticleWifi Hacking with Evil Twin Attack using Linset
Note: For “Evil Twin Attack” , we are using Linset Tool in WiFiSlax operating system. Wifislax is an open source Linux operating system based and inspired by the Slackware Linux distribution. It’s...
View ArticleHack Remote PC using HTA Attack in SET Toolkit
The HTA Attack method will allow you to clone a site and perform powershell injection through HTA files which can be used for Windows-based powershell exploitation through the browser. First open your...
View ArticleHack Gmail and Facebook of Remote PC using DNS Spoofing and SET Toolkit
First open your kali Linux application tab in Exploitation Tools and then chose SET Toolkit Now choose option 1, “Social – Engineering Attacks” and Enter Then choose option 2, “Website Attack Vectors”...
View ArticleHack Remote Windows PC Manage Engine Desktop Central 9 File Upload Servlet...
This module exploits a vulnerability found in ManageEngine Desktop Central 9. When uploading a 7z file, the FileUploadServlet class does not check the user-controlled ConnectionId parameter in the...
View ArticleHack Remote Windows PC using ManageEngine OpManager Remote Code Execution
This module exploits a default credential vulnerability in ManageEngine OpManager, where a default hidden account “IntegrationUser” with administrator privileges exists. The account has a default...
View Article