Quantcast
Channel: Pax Pentest » Exploit
Browsing latest articles
Browse All 51 View Live

Metasploitable 2: UnreaIRCD IRC daemon

The Nmap scan of Metasploitable 2 revealed: PORT STATE SERVICE VERSION 6667/tcp open irc Unreal ircd 6697/tcp open irc Unreal ircd UnreaIRCD is an Internet Relay Chat service. This exploit has been...

View Article


Metasploitable 2: Port 8787 Open and Unknown

The Nmap scan of Metasploitable 2 revealed: PORT      STATE SERVICE     VERSION 8787/tcp  open  unknown As we can see this Nmap scan did not recognise the service signature running on port 8787 and so...

View Article


Metasploitable 2: The Roundup

It has been rather enjoyable and satisfying hacking my way through Metasploitable 2. The process has consolidated some rather disparate knowledge in my brain and I’ve learned loads. I thoroughly...

View Article

Mutillidae II: SQLMAP with WebScarab

Having completed my incursion into Metasploiitable 2 I’m beginning my foray into Mutillidae II. This is my first time using SQLmap and I thought you could simply aim it at a known vulnerable web page...

View Article

@BSidesLondon YouTube Vidoes

Videos are being posted on YouTube of the recent BSidesLondon conference, which are well watching. I’m halfway through: Rafal Wojtczuk – Lol Layers on Layers Bypassing Security for Fun and Profit Over...

View Article


Markets for Cybercrime Tools and Stolen Data Hackers’ Bazaar

Thought I’d share a PDF on research relating to the characteristics of cyber criminal activity and black (and Grey) markets. This was part of the recommended reading for my Malware course and makes for...

View Article

Breaking Bad cybercrime

Thought I’d highlight an informative and entertaining blog post written by Dave Waterson using the springboard of the TV crime drama series Breaking Bad to draw comparisons between the underground drug...

View Article

Hacking the Hackers: How FinFisher was Breached

I first came across Gamma International on the Enemies of the Internet website: Gamma International offers advanced spyware, which has repeatedly been discovered in countries who mistreat journalists,...

View Article


The odd paucity of Cisco exploit research

It’s a strange thing. I can find voluminous exploit research in books and online on every topic under the sun; on every platform, covering all manner of software and hardware, with the exception of...

View Article


Is Tcl programming language the best kept secret in hacking?

Actually the Tcl (Tool Command Language) developers website says: Many have called it the “best-kept secret in the software industry”. They also say: Tcl (Tool Command Language) is a very powerful but...

View Article
Browsing latest articles
Browse All 51 View Live