Description of new hacking technique, which allows data hijacking from victim's local disks or upload and run files to victim's computer (depending on used OS and web browser). What everything attacker can? Attacker can reach the following (depending on used OS and web browser): read directory index of user’s computer disks (a lot of web browsers) read content of text-based files stored in user’s