Blog Posts Tagged with "Metasploit"

D8853ae281be8cfdfa18ab73608e8c3f

Project Honeypot HTTP Blocklist Module

December 29, 2010 Added by:Rob Fuller

Project Honeypot does an amazing job at keeping detailed information on scanners / harvesters and brute forcers, the likes of which are the daily enemy of said admins. They offer a service called HTTP Block List or 'HTTP:BL'...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

New Metasploit 3.5.1 Release Includes Cisco Exploits

December 18, 2010 Added by:Headlines

The recent Metasploit 3.5.1 release offers users a wider range of tools, with 47 new modules and 8 new scripts, and now includes options to perform exploits on Cisco products. The latest version of Metasploit has a total of 635 exploits, 314 auxiliary modules, and 215 payloads available...

Comments  (0)

B64e021126c832bb29ec9fa988155eaf

Viewing Remote Video with Backtrack 4 and Metasploit

December 16, 2010 Added by:Dan Dieterle

Many people have wondered if hackers could take control of a remote webcam. Well, the short answer is yes. If a hacker has compromised your system via malware, exploit or by you clicking on one of those fake online virus scan programs, they could in fact view images through your webcam...

Comments  (0)

E973b16363b3de77b360563237df7e32

Hacking Virtual Machines pt 4 - Targeting a Virtual Machine

December 07, 2010 Added by:Bozidar Spirovski

Identifying that you are attacking a virtual machine can happen in two phases. Before you penetrate the target - identification of a VM can happen if the attacker is on the same LAN, and can therefore investigate the characteristics of the target...

Comments  (0)

E376ca757c1ebdfbca96615bf71247bb

Metasploit and SCADA Exploits: Dawn of a New Era?

November 04, 2010 Added by:shawn merdinger

On October 18, a significant event occurred concerning threats to SCADA, the addition of a zero-day exploit for the RealFlex RealWin SCADA software product into the Metasploit repository. This is the first SCADA exploit added to Metasploit. Striking facts about this event follow...

Comments  (5)

D8853ae281be8cfdfa18ab73608e8c3f

Revenge of the Bind Shell

September 30, 2010 Added by:Rob Fuller

At the April 2010 NoVA Hackers meeting I discussed some of the offensive uses of IPv6 on current networks. Well, around that time Microsoft issued a patch to all of the supported versions of Windows that broke my methodology. Obviously I wasn’t the only one doing this...

Comments  (0)

D8853ae281be8cfdfa18ab73608e8c3f

Rapid Fire PSEXEC for Metasploit

September 16, 2010 Added by:Rob Fuller

Exploit modules inside of Metasploit don't have the ability to run on multiple hosts with one swing of the bat, so I created some code to facilitate that. This is NOT quiet or stealthy, but this is really great for the smash and grab style of CTF competitions....

Comments  (0)

43559f6a0465c923b496a260211995c0

Memory-Only Malware: Look Mom, No Files!

September 09, 2010 Added by:Pascal Longpre

We’ve come across more and more advanced malware that lives in memory only. No files are ever written to disk. Since AV solutions rely on file filtering to detect malware patterns, they’ve become mostly useless to detect and block these kinds of threats, even when they are made public...

Comments  (3)

Page « < 1 - 2 - 3 - 4 - 5 > »