CyberGuerrilla 2013
 Vol.3--No.2013 | 1 User Online
Tuesday,Nov 12,2019 
By ro0ted | December 12, 2013 - 2:38 am | Comments Off on #ro0ted Hacked Remote PC Using Cool PDF Image Stream Buffer Overflow

This module exploits a stack buffer overflow in Cool PDF Reader prior to version 3.0.2.256. The vulnerability is triggered when opening a malformed PDF file that contains a specially crafted image stream. This module has been tested successfully on Cool PDF 3.0.2.256 over Windows XP SP3 and Windows 7 SP Exploit Targets Windows 7 Cool Read more » 



By Anonymous | December 4, 2013 - 8:43 pm | Comments Off on Check if your child is a haxor.


By ro0ted | December 4, 2013 - 12:17 pm | Comments Off on #ro0ted Hack PC in Network using MJM Core Player 2011 .s3m Stack Buffer Overflow

This module exploits a stack buffer overflow in MJM Core Player 2011 when opening a malicious s3m file in this applications, a stack buffer overflow can be triggered, resulting in arbitrary code execution. This exploit bypasses DEP & ASLR, and works on XP, Vista & Windows 7. Exploit Targets Windows XP SP 3 MJM Core Read more » 



By ro0ted | December 4, 2013 - 5:40 am | Comments Off on #ro0ted Exploit PC in LAN using Shadow Stream Recorder 3.0.1.7 Buffer Overflow

This module exploits a buffer overflow in Shadow Stream Recorder 3.0.1.7. Using the application to open a specially crafted asx file, a buffer overflow may occur to allow arbitrary code execution under the context of the user. Exploit Targets Windows XP SP 3 Stream Recorder 3.0.1.7 Attacker: Kali Linux Victim PC: Windows XP SP 3 Read more » 



By ro0ted | December 4, 2013 - 4:53 am | Comments Off on #ro0ted Hack Remote PC Using MJM QuickPlayer 1.00 Beta 60a / QuickPlayer 2010 .s3m Stack Buffer Overflow

This module exploits a stack buffer overflow in MJM QuickPlayer 1.00 beta 60a and QuickPlayer 2010 (Multi-target exploit). When opening a malicious s3m file in one of these 2 applications, a stack buffer overflow can be triggered, resulting in arbitrary code execution. This exploit bypasses DEP & ASLR, and works on XP, Vista & Windows Read more » 



By ro0ted | November 26, 2013 - 3:53 pm | Comments Off on #ro0ted Defcon 21 – Traffic Interception and Remote Mobile Phone Cloning with a Compromised CDMA Femtocell

 



nonymous. Whoever you are, we are ungovernable!
> =[]= This site is run by cyberguerrilla, your friendly anonymous autonomous tech collective since 2010 =[]= This the past that can NOT be changed! <