What is an Early bird code injection technique?

Evading anti malware software has always been a challenge for the hackers out there. Anti viruses are getting smarter everyday by using behavior analysis by implementing machine learning algorithms. Now hackers have developed a new code injection technique called Early bird. In simple words, As the name suggests the malware is injected to a working […]

Rubber ducky, attiny85, mr robot hack, bad usb

1$ Rubber Ducky – Hack any PC within seconds MR.Robot style using Attiny85

We all have seen the hacking scenario in movies where the hacker plugs a USB and the whole system gets pwned. That scene is now possible. Hack5 have released their specially customized USB hardware called rubber ducky or bad USB for this plug and hack method. It can be loaded with codes to run pretty […]

Backdoor factory shellcode

Backdoor factory – How to inject shell-code into windows application

Backdoor factory (BDF) is a pre-installed application in Kali Linux, its used to inject shell-code to any windows application. BDF can inject custom shell-code to an existing binary by adding malicious code in between the genuine source code. First it scans the entire binary and checks compatible payloads then it searches the entire code and […]

windows-login-by-replacing-utilman-exe

Backdoor windows login by replacing utilman.exe

Forgot windows login password? Need to drop a simple backdoor on windows? Then this blog will help you. Utilman.exe is a program designed for users with some disabilities. Utilman enables accessibility features like magnification, narration, virtual keyboard, high contrast themes, etc. This can be helpful for people who have poor vision or with hearing problems. […]

windows privilege escalation using bypassuac_vbs metasploit

windows privilege escalation using “bypassuac vbs” metasploit

Hacking any windows system is an easy process with metasploit. We can use many techniques to compromise windows by either exploiting a remote code execution or malicious file attack. Code is often embedded with genuine applications or executed remotely on an application with limited privileges. When we use getsystem command it will return an error “access […]

hack-windows-10-metasploit-khromozome

How to hack windows 10 using kali linux remotely with metasploit – 2018

Microsoft claims that windows 10 has fixed all security vulnerabilities. We cant hack a windows PC with a remote exploit like ” ms08_067_netapi ” anymore. Windows have fixed that vulnerability. so sad. wait a minute, Then how can we hack a windows pc is that even possible now? The answer is yes, windows machines are still […]