Category Archives: General Security

BackTrack 5 tutorial Part I: Information gathering and VA tools

Greetings! In this BackTrack 5 penetration testing tutorial, we will look at the information gathering and vulnerability assessment tools in BackTrack 5. Dig down to the bottom of the page to read the whole article unregistered on Techtarget on this link: http://searchsecurity.techtarget.in/tip/BackTrack-5-tutorial-Part-I-Information-gathering-and-VA-tools Cheers 3ps!L0nLaMbDa

Metasploit guide 4: Armitage cyber attack management GUI

In this Metasploit guide series, we have so far covered the basics of the Metasploit Framework (Msf); usage details of the meterpreter post-exploitation tool to create exploits that evade detection; as well as database configuration in Metasploit and post-exploitation phases. This fourth and final installment of our Metasploit guide takes a look at Armitage, the… Read More »

Metasploit tutorial part 2: Using meterpreter

In Part I of our Metasploit tutorial, we covered the basics of the Metasploit Framework (MsF), created a simple exploit on a target system, and used payloads to achieve specific results. The disadvantage of using specific payloads is that alarms may be triggered when a new process starts in the target system. Ideally, a payload… Read More »

Metasploit tutorial part 1: Inside the Metasploit framework

The Metasploit Framework (Msf) is a free, open source penetration testing solution developed by the open source community and Rapid7. This Metasploit tutorial covers the basic structure of Metasploit and different techniques of information gathering and vulnerability scans using this tool. Metasploit eliminates the need for writing of individual exploits, thus saving considerable time and… Read More »

SneakPeak @ Metasploit

Hi folks, This is my white paper on Metasploit framework. Contents of the paper: 1. Basics and framework architecture 2. Exploitation with msf 3. Meterpreter using msf 4. Impersonation tokens using incognito 5. Penetration when a victim is behind NAT/Firewall here is the link to the pdf: http://packetstormsecurity.org/files/view/103600/Metasploit_KarthikR.pdf Cheers 3psil0nLaMbDa

Four Handy botnet detection tools and techniques : A tutorial

Recently, my 3rd article got published in a security portal – searchsecurity.techtarget.in. An overview: It’s essential to know the difference between a bot and botnet before you can identify suitable botnet detection techniques and tools. While an autonomous program automatically performing tasks in the absence of a real user is known as a bot, a network of… Read More »