Metasploit All-Ports Payloads: Brute Forcing Ports
I’m targeting ports on the Windows portion of my Virtual Hacking Lab and following instructions given in Chapter 5 (The Joy of Exploitation) of Metasploit: The Penetration Tester’s Guide. The exploitee...
View ArticleMetasploit: Exploiting MS SQL Server: Fast-Track, mssql_ping, mssql_login,...
I’m targeting the MS MSQL Server on the Windows portion of my Virtual Hacking Lab and following instructions given in Chapter 6 (Meterpreter) of Metasploit: The Penetration Tester’s Guide. The...
View ArticleMetasploit Meterpreter Shell: Screenshot, sysinfo, ps, migrate, keylog_recorder
This post follows on from the previous post within which a target machine was exploited and a Meterpreter shell obtained. First to export an image of the target machine’s desktop: meterpreter >...
View ArticleMetasploit Meterpreter: Dumping Username and Password Hashes – hashdump
This follows on from a previous post within which a target machine was exploited and a Meterpreter shell obtained. Details of the exploited machine are: Windows XP Pro Service Pack 2 (unpatched)....
View ArticleMetasploit Meterpreter: Creating a new user in an exploited Windows XP System
This follows on from a previous post within which a target machine was exploited and a Meterpreter shell obtained. Details of the exploited machine are: Windows XP Pro Service Pack 2 (unpatched)....
View ArticleMetasploit: Pass the Hash – windows/smb/psexec
Probably my favourite blog title so far. Following on from the Hashdump post in which I obtained the Windows passwords in the form of hashes and then decrypted them for the password, the following uses...
View ArticleMetasploit Meterpreter: Using ps and stealing Kerberos tokens
This follows on from a previous post within which a target machine was exploited and a Meterpreter shell obtained. Details of the exploited machine are: Windows XP Pro Service Pack 2 (unpatched)....
View ArticleMetasploit Meterpreter: Run VNC
This follows on from a previous post within which a target machine was exploited and a Meterpreter shell obtained. Details of the exploited machine are: Windows XP Pro Service Pack 2 (unpatched)....
View ArticleMetasploit Meterpreter: Sniffing traffic on exploited system – Packetrecorder
This follows on from a previous post within which a target machine was exploited and a Meterpreter shell obtained. Details of the exploited machine are: Windows XP Pro Service Pack 2 (unpatched)....
View ArticleMetasploit Meterpreter: Creating a persistent backdoor connection
This follows on from a previous post within which a target machine was exploited and a Meterpreter shell obtained. Details of the exploited machine are: Windows XP Pro Service Pack 2 (unpatched)....
View ArticleMetasploit Meterpreter: Migrate a process and obtain system password hashes
This follows on from a previous post within which a target machine was exploited and a Meterpreter shell obtained. Details of the exploited machine are: Windows XP Pro Service Pack 2 (unpatched)....
View ArticleMetasploit Meterpreter: Killing Antivirus Software on Exploited System – Killav
This follows on from a previous post within which a target machine was exploited and a Meterpreter shell obtained. Details of the exploited machine are: Windows XP Pro Service Pack 2 (unpatched)....
View ArticleMetasploit: Listing Meterpreter Post Exploitation Modules
This follows on from a previous post within which a target machine was exploited and a Meterpreter shell obtained. Details of the exploited machine are: Windows XP Pro Service Pack 2 (unpatched)....
View ArticleMetasploit Meterpreter Railgun: Post Exploit Windows API Manipulation
Metasploit: The Penetration Tester’s Guide has this to say about Railgun: You can interface with the Windows native API directly through a Metasploit add-on called Railgun. [....] Railgun gives you the...
View ArticleOWASP WebGoat: Stored XSS Attacks
Here’s OWASP’s lesson principle: Lesson Plan Title: How to Perform Stored Cross Site Scripting (XSS) Concept / Topic To Teach: It is always a good practice to scrub all inputs, especially those inputs...
View ArticleMetasploit: Experimenting with Immunity Debugger, NOP’s, Opcode, Assembly...
I’m following instruction given in Metasploit: The Penetration Tester’s Guide - Chapter 8 (Exploitation Using Client-Side Attacks). It’s worth watching this excellent video which demonstrates the...
View ArticleMetasploit Meterpreter: Internet Explorer “Aurora” Memory Corruption...
I’m following instruction given in Metasploit: The Penetration Tester’s Guide - Chapter 8 (Exploitation Using Client-Side Attacks). Details of the target machine on my Virtual Hacking Lab: Windows XP...
View ArticleMetasploit Meterpreter: MS11-006 Client-Side Malicious Document Exploit –...
I’m following instruction given in Metasploit: The Penetration Tester’s Guide - Chapter 8 (Exploitation Using Client-Side Attacks). Details of the target machine on my Virtual Hacking Lab: Windows XP...
View ArticleThe Social-Engineer Toolkit (SET) and Metasploit: Spear-Phishing Attack Vectors
This post follows instructions given in chapter ten (The Social-Engineer Toolkit) of Metasploit: The Penetration Tester’s Guide, Previous post here. Here’s what we’re greeted with in the terminal on...
View ArticleRuby on Rails Vulnerability: The Exploit and the Importance of Patching
Guest post: If you’re running Ruby on Rails CVE-2013-0156 but haven’t patched your server yet, what are you waiting for? Nothing good lasts forever, and as it must to all good things, an attack has...
View Article