Blog Posts Tagged with "Metasploit"


Project Honeypot HTTP Blocklist Module

December 29, 2010 Added by:Rob Fuller

Project Honeypot does an amazing job at keeping detailed information on scanners / harvesters and brute forcers, the likes of which are the daily enemy of said admins. They offer a service called HTTP Block List or 'HTTP:BL'...

Comments  (0)


New Metasploit 3.5.1 Release Includes Cisco Exploits

December 18, 2010 Added by:Headlines

The recent Metasploit 3.5.1 release offers users a wider range of tools, with 47 new modules and 8 new scripts, and now includes options to perform exploits on Cisco products. The latest version of Metasploit has a total of 635 exploits, 314 auxiliary modules, and 215 payloads available...

Comments  (0)


Viewing Remote Video with Backtrack 4 and Metasploit

December 16, 2010 Added by:Dan Dieterle

Many people have wondered if hackers could take control of a remote webcam. Well, the short answer is yes. If a hacker has compromised your system via malware, exploit or by you clicking on one of those fake online virus scan programs, they could in fact view images through your webcam...

Comments  (0)


Hacking Virtual Machines pt 4 - Targeting a Virtual Machine

December 07, 2010 Added by:Bozidar Spirovski

Identifying that you are attacking a virtual machine can happen in two phases. Before you penetrate the target - identification of a VM can happen if the attacker is on the same LAN, and can therefore investigate the characteristics of the target...

Comments  (0)


Metasploit and SCADA Exploits: Dawn of a New Era?

November 04, 2010 Added by:shawn merdinger

On October 18, a significant event occurred concerning threats to SCADA, the addition of a zero-day exploit for the RealFlex RealWin SCADA software product into the Metasploit repository. This is the first SCADA exploit added to Metasploit. Striking facts about this event follow...

Comments  (5)


Revenge of the Bind Shell

September 30, 2010 Added by:Rob Fuller

At the April 2010 NoVA Hackers meeting I discussed some of the offensive uses of IPv6 on current networks. Well, around that time Microsoft issued a patch to all of the supported versions of Windows that broke my methodology. Obviously I wasn’t the only one doing this...

Comments  (0)


Rapid Fire PSEXEC for Metasploit

September 16, 2010 Added by:Rob Fuller

Exploit modules inside of Metasploit don't have the ability to run on multiple hosts with one swing of the bat, so I created some code to facilitate that. This is NOT quiet or stealthy, but this is really great for the smash and grab style of CTF competitions....

Comments  (0)


Memory-Only Malware: Look Mom, No Files!

September 09, 2010 Added by:Pascal Longpre

We’ve come across more and more advanced malware that lives in memory only. No files are ever written to disk. Since AV solutions rely on file filtering to detect malware patterns, they’ve become mostly useless to detect and block these kinds of threats, even when they are made public...

Comments  (3)

Page « < 1 - 2 - 3 - 4 - 5 > »