• 26,769
  • +1,026
  • 3,010

Privilege Escalation in Me...

Type : Tips and TrickLevel : EasyWhat is privilege escalation? according to wikipedia Privilege Escalation is the act of exploiting a bug, design flaw or configuration oversight in an operating system or software application to gain elevated access to resources that are normally protected from an application or user. The result is that an application with more...

Social Engineering Tabnabb...

Type : TutorialLevel : Medium, AdvancedPlatform Testing : Windows XP SP3Browser : Mozilla Firefox 3.6.1.6Again in this tutorial we will learn something related to Social Engineering Attack using Social Engineering Toolkit. This tutorial was talked about Social Engineering Tabnabbing Attack combining with Ettercap DNS Poisoning. This method actually...

Microsoft to Fix 22 Flaws ...

Microsoft is to release a larger than usual security update on 9 August, with 13 patches fixing 22 vulnerabilities. ‘Critical’ flaws in Internet Explorer 6-9 and Windows XP, Vista, Server 2003 and 2008 all allow remote code execution on a target machine, and all patches require a full restart. The bulk of the patches are rated ‘important’,...

Client Side Attack Using A...

Type : TutorialLevel : Medium, HardTesting Platform : Win XP SP3, Windows 7Vulnerable Application Testing : Adobe Reader 9.1There are some people says that the weakest security to breach was the human itself. I didn't say it was WRONG, because in fact yes it was the weakest, but I also cannot say TRUE, because sometimes the human didn't know...

Hacking Mozilla Firefox 3....

Today while surfing I read some news about nsTreeRange Mozilla Firefox version 3.5 to 3.6.1.6 Vulnerability. Actually this vulnerbility ranking is not excellent or good, but it’s normal vulnerability. This vulnerability was known at 2011-07-10 by sinn3r. In this tutorial I’m using Windows 7 for my victim Operating system with Mozilla Firefox v 3.5.17. If...

Using PsEXEC with Metasplo...

Type: TutorialLevel: Medium, AdvancedThe main problem of people nowadays with password it's hard to remember, that's why they usually put the same password for every account and even for every device they have. For example if you're in school, university, or office when they have a lot of computer, it's impossible to give different password...

Analysts calm fears of ind...

Fears over a recent malware outbreak described by one firm as “practically indestructible” have been quelled by other security analysts who noted there is a simple method to stop it spreading. Dubbed TDL4, the malware was the subject of a recent report from Kaspersky Lab which characterised the malware as “the most sophisticated threat...

Hacker Defender HxDef Root...

Type : TutorialLevel : Medium, AdvancedA few moment ago I’m looking for my backup files that maybe already been obsolete :p because I didn’t open it for almost 6-7 years 😮 LoL… I find Hacker Defender HxDef Rootkit on my HDD 🙂 this rootkit is really famous that time…I know maybe for some of you it’s just simple rootkit and...

Tuesday Great Themes #15 [...

HP Water Theme for XPFilesize : 8.75 MBFiletype : RARDownload Link:www.ziddu.com/download/15105952/hp-water.rar.htmlwww.fileserve.com/file/mCMWGa8Preview...

Tuesday Great Themes #12 [...

 Windows 7 Aero Themes Download Link:www.ziddu.com/download/14840181/themesWin7.rar.htmlwww.fileserve.com/file/EZVmSvVFilesize : 91.8 MBOperating System : Windows XP, Windows Vista, Windows 7Preview...

Tuesday Great Themes #9 [B...

Blue Internity and Red Salvation Windows Themes 2011Download Link:hotfile.com/dl/114082464/9b8fd14/2T2.rar.htmlwww.ziddu.com/download/14557499/2T2.rar.htmlwww.fileserve.com/file/Pc9jTPkwww.enterupload.com/uw6uzfizjnfb/2T2.rar.htmlFilesize : 10.6 MBOperationg System : Windows XP, Vista, Windows...

Joomla Component (com_file...

 ### # Title : Joomla Component (com_fileuploader) Upload File Vulnerability # Author : KedAns-Dz # E-mail : ked-h@hotmail.com # Home : HMD/AM (30008/04300) - Algeria -(00213555248701)...

Microsoft warns of Windows...

Microsoft warned today of a Windows vulnerability that could allow an attacker to take control of a computer if the user is logged on with administrative rights. To be successful, an attacker would have to send an e-mail with an attached Microsoft Word or PowerPoint file containing a specially crafted thumbnail image and convince the recipient to open it, Microsoft...

Page 3 of 41234