Quantcast
Browsing all 51 articles
Browse latest View live

Metasploit All-Ports Payloads: Brute Forcing Ports

I’m targeting ports on the Windows portion of my Virtual Hacking Lab and following instructions given in Chapter 5 (The Joy of Exploitation) of Metasploit: The Penetration Tester’s Guide. The exploitee...

View Article


Metasploit: Exploiting MS SQL Server: Fast-Track, mssql_ping, mssql_login,...

I’m targeting the MS MSQL Server on the Windows portion of my Virtual Hacking Lab and following instructions given in Chapter 6 (Meterpreter) of Metasploit: The Penetration Tester’s Guide. The...

View Article


Image may be NSFW.
Clik here to view.

Metasploit Meterpreter Shell: Screenshot, sysinfo, ps, migrate, keylog_recorder

This post follows on from the previous post within which a target machine was exploited and a Meterpreter shell obtained. First to export an image of the target machine’s desktop: meterpreter >...

View Article

Metasploit Meterpreter: Dumping Username and Password Hashes – hashdump

This follows on from a previous post within which a target machine was exploited and a Meterpreter shell obtained. Details of the exploited machine are: Windows XP Pro Service Pack 2 (unpatched)....

View Article

Image may be NSFW.
Clik here to view.

Metasploit Meterpreter: Creating a new user in an exploited Windows XP System

This follows on from a previous post within which a target machine was exploited and a Meterpreter shell obtained. Details of the exploited machine are: Windows XP Pro Service Pack 2 (unpatched)....

View Article


Metasploit: Pass the Hash – windows/smb/psexec

Probably my favourite blog title so far. Following on from the Hashdump post in which I obtained the Windows passwords in the form of hashes and then decrypted them for the password, the following uses...

View Article

Metasploit Meterpreter: Using ps and stealing Kerberos tokens

This follows on from a previous post within which a target machine was exploited and a Meterpreter shell obtained. Details of the exploited machine are: Windows XP Pro Service Pack 2 (unpatched)....

View Article

Image may be NSFW.
Clik here to view.

Metasploit Meterpreter: Run VNC

This follows on from a previous post within which a target machine was exploited and a Meterpreter shell obtained. Details of the exploited machine are: Windows XP Pro Service Pack 2 (unpatched)....

View Article


Image may be NSFW.
Clik here to view.

Metasploit Meterpreter: Sniffing traffic on exploited system – Packetrecorder

This follows on from a previous post within which a target machine was exploited and a Meterpreter shell obtained. Details of the exploited machine are: Windows XP Pro Service Pack 2 (unpatched)....

View Article


Metasploit Meterpreter: Creating a persistent backdoor connection

This follows on from a previous post within which a target machine was exploited and a Meterpreter shell obtained. Details of the exploited machine are: Windows XP Pro Service Pack 2 (unpatched)....

View Article

Metasploit Meterpreter: Migrate a process and obtain system password hashes

This follows on from a previous post within which a target machine was exploited and a Meterpreter shell obtained. Details of the exploited machine are: Windows XP Pro Service Pack 2 (unpatched)....

View Article

Metasploit Meterpreter: Killing Antivirus Software on Exploited System – Killav

This follows on from a previous post within which a target machine was exploited and a Meterpreter shell obtained. Details of the exploited machine are: Windows XP Pro Service Pack 2 (unpatched)....

View Article

Metasploit: Listing Meterpreter Post Exploitation Modules

This follows on from a previous post within which a target machine was exploited and a Meterpreter shell obtained. Details of the exploited machine are: Windows XP Pro Service Pack 2 (unpatched)....

View Article


Image may be NSFW.
Clik here to view.

Metasploit Meterpreter Railgun: Post Exploit Windows API Manipulation

Metasploit: The Penetration Tester’s Guide has this to say about Railgun: You can interface with the Windows native API directly through a Metasploit add-on called Railgun. [....] Railgun gives you the...

View Article

OWASP WebGoat: Stored XSS Attacks

Here’s OWASP’s lesson principle: Lesson Plan Title: How to Perform Stored Cross Site Scripting (XSS) Concept / Topic To Teach: It is always a good practice to scrub all inputs, especially those inputs...

View Article


Metasploit: Experimenting with Immunity Debugger, NOP’s, Opcode, Assembly...

I’m following instruction given in Metasploit: The Penetration Tester’s Guide - Chapter 8 (Exploitation Using Client-Side Attacks). It’s worth watching this excellent video which demonstrates the...

View Article

Image may be NSFW.
Clik here to view.

Metasploit Meterpreter: Internet Explorer “Aurora” Memory Corruption...

I’m following instruction given in Metasploit: The Penetration Tester’s Guide - Chapter 8 (Exploitation Using Client-Side Attacks). Details of the target machine on my Virtual Hacking Lab: Windows XP...

View Article


Metasploit Meterpreter: MS11-006 Client-Side Malicious Document Exploit –...

I’m following instruction given in Metasploit: The Penetration Tester’s Guide - Chapter 8 (Exploitation Using Client-Side Attacks). Details of the target machine on my Virtual Hacking Lab: Windows XP...

View Article

The Social-Engineer Toolkit (SET) and Metasploit: Spear-Phishing Attack Vectors

This post follows instructions given in chapter ten (The Social-Engineer Toolkit) of Metasploit: The Penetration Tester’s Guide, Previous post here. Here’s what we’re greeted with in the terminal on...

View Article

Ruby on Rails Vulnerability: The Exploit and the Importance of Patching

Guest post: If you’re running Ruby on Rails CVE-2013-0156 but haven’t patched your server yet, what are you waiting for? Nothing good lasts forever, and as it must to all good things, an attack has...

View Article
Browsing all 51 articles
Browse latest View live