Category Archives: Hacking

The Metasploit Framework Tutorial PDF compendium: Mr. Karthik Ranganath

The Metasploit Framework is a free, open source penetration testing solution developed by the open source security community. Metasploit Framework eliminates the need for writing individual exploits, saving pen-testers considerable time and effort. Originally created by H D Moore in 2003, Metasploit was later bought over by Rapid7. Over time, it has matured into a… Read More »

BackTrack 5 tutorial Part I: Information gathering and VA tools

Greetings! In this BackTrack 5 penetration testing tutorial, we will look at the information gathering and vulnerability assessment tools in BackTrack 5. Dig down to the bottom of the page to read the whole article unregistered on Techtarget on this link: http://searchsecurity.techtarget.in/tip/BackTrack-5-tutorial-Part-I-Information-gathering-and-VA-tools Cheers 3ps!L0nLaMbDa

Metasploit guide 4: Armitage cyber attack management GUI

In this Metasploit guide series, we have so far covered the basics of the Metasploit Framework (Msf); usage details of the meterpreter post-exploitation tool to create exploits that evade detection; as well as database configuration in Metasploit and post-exploitation phases. This fourth and final installment of our Metasploit guide takes a look at Armitage, the… Read More »

Metasploit tutorial part 2: Using meterpreter

In Part I of our Metasploit tutorial, we covered the basics of the Metasploit Framework (MsF), created a simple exploit on a target system, and used payloads to achieve specific results. The disadvantage of using specific payloads is that alarms may be triggered when a new process starts in the target system. Ideally, a payload… Read More »

Metasploit tutorial part 1: Inside the Metasploit framework

The Metasploit Framework (Msf) is a free, open source penetration testing solution developed by the open source community and Rapid7. This Metasploit tutorial covers the basic structure of Metasploit and different techniques of information gathering and vulnerability scans using this tool. Metasploit eliminates the need for writing of individual exploits, thus saving considerable time and… Read More »

SneakPeak @ Metasploit

Hi folks, This is my white paper on Metasploit framework. Contents of the paper: 1. Basics and framework architecture 2. Exploitation with msf 3. Meterpreter using msf 4. Impersonation tokens using incognito 5. Penetration when a victim is behind NAT/Firewall here is the link to the pdf: http://packetstormsecurity.org/files/view/103600/Metasploit_KarthikR.pdf Cheers 3psil0nLaMbDa