Tutorials

Find Vulnerable Webcams with Shodan [Metasploit Framework]

As we all knows that, Shodan is one of the most popular and dangerous search engine which gives you all information from the banners and pulls from web-enabled devices like routers/switches/traffic-lights/scada/cameras etc. There are many ways to find web cams on Shodan. Usually, using the name of the manufacturer of the webcam is a good […]

Tech Articles

Metasploit DB Commands [Cheatsheet 2018]

The post exploitation phase always begins after you have compromised one or more systems but you’re not even close to being done yet. Metasploit generally offers more than one interface to its underlying functionality, including console, command line, and graphical interfaces. In addition to these interfaces, utilities provide direct access to functions that are normally […]