Metasploit Framework

Metasploit is a powerful and widely-used tool in the penetration testing community. It provides a comprehensive framework for developing, testing, and executing exploits against a variety of systems. While many penetration testers are…
Read more
Penetration testing, also known as ethical hacking, is a vital practice in ensuring an organization’s cybersecurity. It helps to identify vulnerabilities, misconfigurations, and potential entry points that malicious attackers could exploit. As we…
Read more
The Metasploit Framework contains a suite of tools that you can use to test security vulnerabilities, enumerate networks, execute attacks, and evade detection. One of the best feature of Metasploit Framework is that…
Read more
The Java Remote Method Invocation, or Java RMI, is a mechanism that allows an object that exists in one Java virtual machine to access and call methods that are contained in another Java…
Read more
A vulnerability in GNU Bash could allow an unauthenticated, remote attacker to inject arbitrary commands so called as ShellShock Vulnerability. The vulnerability is due to improper processing of environment variables by the affected…
Read more
Well as you all knows that, file upload control is always at major risk for developers because there are N number of ways to bypass this control and an attacker can easily upload…
Read more
The Metasploit framework is well known in the realm of exploit development. It is a standalone tool for security researchers, penetration testers and IDS/IPS developers. As of now, it has 1700+ exploit definitions…
Read more
Metasploit has for years supported encoding payloads into VBA code. (VBA, or Visual Basic for Applications, is the language that Microsoft Office macros are written in.) Macros are great for pentesters, since they…
Read more
EternalBlue Metasploit exploits a vulnerability in Microsoft’s implementation of the Server Message Block (SMB) protocol. The vulnerability exists because the SMB version 1 (SMBv1) server in various versions of Microsoft Windows mishandles specially…
Read more
As we all knows that, Shodan is one of the most popular and dangerous search engine which gives you all information from the banners and pulls from web-enabled devices like routers/switches/traffic-lights/scada/cameras etc. There…
Read more
Metasploit is currently the most buzzing word in the field of information security and penetration testing. It has totally revolutionized the way we can perform security tests on our systems. The reason which…
Read more
The post exploitation phase always begins after you have compromised one or more systems but you’re not even close to being done yet. Metasploit generally offers more than one interface to its underlying…
Read more
Last year, a critical remote code execution vulnerability was found in Palo Alto Network Firewalls by Philip Pettersson. Palo Alto Network Firewalls has a component called as PAN-OS whose versions 6.1.18, 7.0.18, 7.1.13,…
Read more
As we all knows, Metasploit Framework is one of the most popular exploitation framework. Often new modules and exploits are always developed for Metasploit on time to time by hackers and security researchers,…
Read more
The Metasploitable machines are those vulnerable machines, designed by Rapid7 Company for training offensive security skills and testing exploits. To install Metasploitable3 on windows is not easy as Metasploitable2 installation, here you need…
Read more
Footprinting is the process of collecting as much information as possible about a target network, for identifying various ways to intrude into an organization’s network system. Out of the many useful auxiliary modules…
Read more
PHP is a widely-used general-purpose scripting language that is especially suited for Web development and can be embedded into HTML. When PHP is used in a CGI-based setup (such as Apache’s mod_cgid), in…
Read more
Everyone who has been involved with IT for more than a few months has at least heard of MySQL. The driving force behind MySQL has been to provide a reliable, high-performance server that…
Read more
In this article, we’ll be exploiting the HTTP PUT method vulnerability on one of the Metasploitable2 webserver through which you can easily upload any malicious file onto the server and can gain the…
Read more
Port Scan is Often done by hackers and penetration testers to identifying and discovering internal services of target host. Port Scanning is an important action for gathering more information of the target host….
Read more
It’s difficult to talk about any system in a vacuum, especially a system that is so widely deployed in so many roles as Windows in all of its flavors. To see how easily…
Read more
This is a very detailed step by step tutorial on How to pentest a Remote PC (Windows 2000/2003 server) with Metasploit Framework. We’ve used Kali Linux 2017.1 and Windows 2000 server in a…
Read more