• 25,450
  • +1,003
  • 2,796

Remote Buffer Overflow Exp...

Hello, this time we are coding a Remote Buffer Overflow Exploit with Python that works with TCP only 🙂You are going to need:     – Python 3.4     – Internet Connection     – A vulnerable server     – Computer with Windows or LinuxIf you...

Nintendo 3DS is hacked to ...

Nintendo better hire a decent sea monster to help them fight off a potential onslaught of 3DS pirates. 3DS hacker Neimod has revealed that he has gained full control of a 3DS kernel that enables the device to run custom code, according to GBAtemp.net. Such code will open the handheld to independently created home-brew software and pirated games. “With full kernel...

Hacking Windows 7 SP1 via ...

Type : TutorialLevel : MediumAttacker O.S : Backtrack 5 R3Victim O.S : Windows 7 SP1, XP, ServerExploit Author : eromang, mahmud ab rahman, sinn3rMerry Christmas and Happy New Year 2013 everyone, hope all of you great and healthy and always blessed especially in this new year. Actually my holiday haven't finished 🙂 because I still have a...

Create Exploit Using Msfve...

Type : TutorialLevel : MediumAttacker O.S : Backtrack 5 R2Victim O.S : Windows 7 SP1After last tutorial about generating a shellcode using msfpayload, today we will learn to use another Metasploit framework commend line instance called msfvenom.In this tutorial about create exploit using msfvenom to hack windows 7 sp1, we will make an exploit by...

Java Bytecode Verifier Rem...

Type : TutorialLevel : MediumVictim O.S : Windows 7 UltimateAttacker O.S : Backtrack 5 R2 with Metasploit Framework v4CVE : 2012-1723Credits :    Stefan Cornellius,     # Discoverer mihi,                  # Vuln...

How to Add External Exploi...

Type : Tips and trickLevel : EasyThis tips and trick I made because a few days ago while I want to test an external exploit with ruby extension .rb I can’t find the folder destination. Usually when you want to add external exploit into your metasploit framework you can copy your external exploit.rb to /pentest/exploit/framework/exploits/modules/. This...

How to Port Forward Browse...

Type : Tips and TrickLevel : Easy – MediumUPDATE : This tips and trick can only work on Local Area Network with 2 different network address, not on WAN. Sorry about it…but if you still want to read it down, you can continue.This tips and trick "How to Port Forward Browser Exploit From Router to Your Exploit Server" I believe it...

Create Simple Exploit Usin...

Type : TutorialLevel : EasyAs I have already wrote on my previous post about how to add a user with administrator rights (you can read the tips and trick here), today I will wrote a simple tutorial to create an exploit for Windows 7 and all Windows.Everyone love and like the simple way isn’t it? that’s why in my previous tutorial and today...

Metasploit Exploit Ranking

The following article I got from Rapid 7 website, describe the ranking in Metasploit exploit.The ranking values are one of the following, in ascending order of reliability:ManualRankingLowRankingAverageRankingNormalRankingGoodRankingGreatRankingExcellentRanking The ranking...

Hacking Windows using Mozi...

Type : TutorialLevel : MediumAttacker O.S : Backtrack 5R1Victim O.S : Windows XP SP3Vulnerable Application : none (the people are vulnerable in this case)Exploit Credits : mihi < >After long time with busy days finally I can wrote another tutorial about Windows Hacking. Today the tutorial was about "Mozilla Firefox Bootstrapped...

Hacking Tutorial Windows X...

Type : TutorialLevel : MediumAttacker O.S : Backtrack 5 R1Victim O.S : Windows XP SP 3Vulnerable Application : Adobe Flash PlayerExploit Credits : Alexander Gavrun, Abysssec, Sinn3rThis module exploits a vulnerability found in Adobe Flash Player's Flash10u.ocx component.  When processing a MP4 file (specifically the Sequence...

4 Steps Hacking XP SP3 MS1...

Type : TutorialLevel : MediumAttacker O.S : Backtrack 5 R1Victim O.S : Windows XP SP3Vulnerable Application : Windows Multimedia Library (winmm.dll)Exploit Credits : Shane Garrett, Juan Vazquez, Sinn3rThis module exploits a heap overflow vulnerability in the Windows Multimedia Library (winmm.dll). The vulnerability occurs when parsing...

7 Step Hacking Windows usi...

Type : TutorialLevel : MediumAttacker O.S : Backtrack 5 R1Victim O.S : Windows XP SP3, Vista, Windows 7(according to exploit creator)Vulnerable Application : CCMPlayer 1.5Exploit Credits : Rh0This module exploits a stack based buffer overflow in CCMPlayer 1.5. Opening a m3u playlist with a long track name, a SEH exception record can be...

Page 1 of 512345