Metasploit Buyout
New Logo Today HD Moore and Rapid7 announced that Rapid7 has purchased the Metasploit Framework Project. The speculation around this has taken the pentest and vulnerability scanning community by storm....
View ArticleNsploit: Nmap grows some teeth
Ryan Linn has started a project to bridge Nmap Scans all the way to exploitation using Metasploit. Similar to the db_autopwn via fasttrack script (available in Backtrack 4), Nsploit does even more...
View ArticleGetsystem, Privilege Escalation via Metasploit
A few weeks ago Chris Gates (ala Attack Research/Carnal Ownage) and Joshua Gauthier showed some quick snippets of Metasploit’s Getsystem extension. Getsystem is meterpreter’s new (windows) privilege...
View ArticleExploit the User with SET – The Social Engineering Toolkit
I have to say… SET is just plain awesome. The Social Engineering Toolkit (SET) is a set of python scripts created by David Kennedy (aka rel1k) to automate many client side penetration testing vectors....
View ArticleQuickly gathering logins/emails with theHarvester and Metasploit
Like GI Joe always said: Knowing is half the battle… And so it is the same with hacking. One of the first parts of recon in a pentest is gathering valid login names and emails. We can use these to...
View ArticleReview: Advanced Penetration Testing (APT)
Review: Advanced Penetration Testing (APT) This year I had the opportunity to take a few stellar instructor-led training courses, one of which was Joe McCray's "Advanced Penetration Testing: Pentesting...
View ArticleBEEF and Metasploit
The Metasploit integration is getting so wicked. Nmap, Nessus, and a slew of other imports to your db_ ‘s just make it easier to script your way through network pentests using .rc files and...
View ArticleThe Big Fat Metasploit Post
A while ago we tried to identify a core toolset that every pentester should start with or couldn’t live without. The first article focused on Nmap, The second on our list is none other than the exploit...
View ArticleEasy Wireless Honey-Pots using Win7 and Metasploit
I found myself inspired by Vivek Ramachandran’s videos, I thought I would take the honor in creating the simple meterpreter script that basically does what you see in the third installation of the...
View ArticleMicrosoft Office 2007 Excel .xlb Metasploit Module (MS11-021)
Timeline : Vulnerability discovered and reported to ZDI by Aniway Vulnerability reported to vendor by ZDI the 2010-10-18 Coordinated release of the vulnerability the 2011-04-12 Metasploit PoC provided...
View Article
More Pages to Explore .....