PEN-200: Penetration Testing (OSCP)
This blog post provides an overview of the PEN-200: Penetration Testing (OSCP) course, which is geared toward individuals who are interested in becoming certified penetration […]
Read moreInternet Penetration Testing
This blog post provides an overview of the PEN-200: Penetration Testing (OSCP) course, which is geared toward individuals who are interested in becoming certified penetration […]
Read morePHP CGI Vulnerability – When run as a CGI, PHP up to version 5.3.12 and 5.4.2 is vulnerable to an argument injection vulnerability. This module takes…
Read moreAttack Unreal IRC Server – This module exploits a malicious backdoor that was added to the Unreal IRCD 3.2.8.1 download archive. This backdoor was present…
Read moreBrute force FTP services are the most common attack on Internet, we just setup a simple tool to test a different combination of usernames and…
Read moreAttack FTP Service – This module exploits a malicious backdoor that was added to the VSFTPD download archive. This backdoor was introduced into the vsftpd
Read moreLearn how to attack Linux Samba service with metasploit. This module exploits a command execution vulnerability in Samba versions 3.0.20 through 3.0.25rc3
Read moreLinux Kernel Boot Parameters are passed to the kernel when the machine is booting. We can pass parameters to control disks, graphics cards, serial consoles.
Read moreLearn How to Protocols Manipulation can be done on Kernel and optimize your performance. Networking Protocols Manipulation Network Stack Networking Protocols – Layer 2 MAC […]
Read moreFlags TCP IP – As a pentester you need to fully understand the TCP IP protocol, here I will explain the different flags used to create and maintain TCP sockets…
Read more