The penetration testing industry is enjoying an upsurge as more high-profile security breaches are reported in the media, such as the recent LinkedIn password debacle, and companies scramble to tighten up their systems. Done correctly, pen testing can illuminate security flaws in a network by utilizing the skills and viewpoint of an external third party, […]
CVE-2012-1889: Microsoft XML Core Services Vulnerability Metasploit Demo
CVE-2012-1889: Microsoft XML Core Services Vulnerability A vulnerability in Microsoft XML Core Services 3.0, 4.0, 5.0, and 6.0 allows remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker would have no way to force users to visit such a website. Instead, an attacker would have to convince users […]
CVE-2012-1875 : Hacking windows using MS12-037 Internet Explorer Same ID Vulnerability
Hi, Today i am going to explain how to hack the Windows system using the recent IE exploit. This article is intend to educate PenTesters. If you don’t know what Penetration testing means, then please reads this article. Also please read the previous articles on Pen Testing. CVE-2012-1875 : MS12-037 Internet Explorer Same ID Vulnerability […]
CVE-2012-2122: Exploiting authentication bypass vulnerability in MySQL and MariaDB
The news about the vulnerability in MySQL and MariaDB spreads like a wild fire. I have covered about this vulnerability in E Hacking news as news article. Here, i am going to share the same thing from the perspective of a penetration tester. The MySQL and MariaDB versions 5.161,5.2.11,5.3.5 and 5.5.c2 are affected version. The […]
Hash Code verifier v1.1 released – Generate Hash for multiple files
Hello BTS readers, we have update our File Integrity verifying tool “Hash Code Verifier”. The new version 1.1 is available to download. Changelog:———————– recursive directory traversal: Generate hash for all files in the given folder Clear Table Bug fixed Singl File comparing issue Fixed Right-Click copy menu null file creation fixed Hide/Show Columns options User […]
[VIDEO Tutorial] Exploiting Java AtomicReferenceArray Type violation vulnerability
The Text+Image version of this video is available here:Exploiting Java vulnerability
Hacking Windows 7 & Xp with Fake Firefox add-on (XPI) : Metasploit Tutorials
Hello BTS readers, i believe you enjoyed my last tutorial ( Java AtomicReferenceArray type violation vulnerability and exploiting ). So here is second tutorial for you ! In this tutorial i am going to explain how to hack any windows machine(xp,7) with the help of Metasploit. Unlike last tutorial, we are not going to exploit […]
How to hack remote computer using Metasploit? Exploiting Java vulnerability CVE-2012-0507
Whenever someone say PenTesting tool, the first thing come in our mind is MetaSploit . Today, i am going to demonstrate how to use the Metasploit tool to exploit the popular java AtomicReferenceArray Type Violation vulnerability(CVE-2012-0507). About MetaSploit: Metsploit is a very Powerful PenTesting Tool . Metasploit Framework, a tool for developing and executing exploit […]
List of Best Ethical Hacking / Penetration Testing Tools
Here is list of useful and Best Software tools that helpful in Ethical Hacking and Penetration Testing, Forensics … MetaSploit : Metsploit is a very Powerful PenTesting Tool . Metasploit Framework, a tool for developing and executing exploit code against a remote target machine. The Metasploit Project is also well known for anti-forensic and evasion […]
Download Hash Code Verifier v1.0 : A tool to verify the File Integrity
Hello BTS Readers,we are happy to announce that we have released our second security tool ‘Hash Code Verifier’. Hash Code Verifier is a Cross-platform application to verify the Integrity of your download files. Hash Code verifier can be very useful if you want to check if a downloaded file is original and not corrupted or […]