metasploit

  1. Metasploit Cheat Sheet

  2. Metasploit for Pentester: Mimikatz

    This article will showcase various attacks and tasks that can be performed on a compromised Windows Machine which is a part of a Domain Controller through Metasploit inbuilt Mimikatz Module which is also known as kiwi. We covered various forms of Credential Dumping with Mimikatz in our Series...
  3. Metasploit for Pentester: Sessions

    In this series of articles, we will be focusing on the various mechanisms of the Metasploit Framework that can be used by Penetration Testers. Today we are going to learn about the session’s command of the Metasploit Framework. Sessions command helps us to interact and manipulate the various...
  4. Metasploit for Pentester: Clipboard

    In this series of articles, we will be focusing on the various mechanisms of the Metasploit Framework that can be used by Penetration Testers. Here, we will be discussing the External API extension provided by Metasploit. Among other things, it provides the ability to target the clipboard of...
  5. Metasploit for Pentester: Inject Payload into Executable

    Being lurking and undetectable is the priority after anonymity. In this article, we are going to learn how to create an innocuous-looking backdoor and bind it with a legitimate executable file to gain the victims’ trust. Table of Content Pre-requisites for Lab set up Executable file search on...
  6. Metasploit for Pentester: Migrate

    In the continuation in this series of articles dedicated to the Metasploit Framework to provide an appropriate resource for Penetration Testers so that they can use the variety of the features present in the Metasploit Framework to the maximum extent. In this article, we will be talking about...
  7. Metasploit for Pentester: Windows Hidden Bind Shell

    In this article, we are going to cover the tactics of Hidden BIND TCP shellcode. Every organization has multiple scanning tools to scan their network and to identify the new or unidentified open ports. In this type of environment, it’s very difficult to hide the suspicious bind shellcode and...
  8. Metasploit for Pentester: Creds

    This is in continuation with the Metasploit for Pentester series of articles that we are presenting. More specifically we learned about the Workspaces and the Metasploit Database service in this article: Metasploit for Pentester: Database & Workspace. In this article, we will be discussing...
  9. Metasploit for Pentester: Database & Workspace

    In this series of articles, we are focusing on the various mechanisms of the Metasploit Framework that can be used by Penetration Testers. Today we are going to learn about the workspace and database commands of the Metasploit Framework. Table of Content Introduction Creating a Workspace...
  10. MSSQL for Pentester: Metasploit

    In this article, we will learn in detail how to pentest MSSQL servers using the Metasploit framework. Table of content Introduction Information Gathering & Enumeration Locating MSSQL Server Password Cracking Retrieving MSSQL version MSSQL Enumeration SQL Users Enumeration Capturing MSSQL...
  11. Msfvenom Cheatsheet: Windows Exploitation

    In this post, you will learn how to use MsfVenom to generate all types of payloads for exploiting the windows platform. Read beginner guide from here Table of Content Requirements MsfVenom Syntax Payload and its types Executable Payload (exe) Powershell Batch File HTML Application Payload...
  12. Msfvenom Tutorials for Beginners

    Hello friends!! Today we will learn to create payloads from a popular tool known as Metasploit, we will explore various option available within the tool to create payloads with different extensions and techniques. Msfvenom Msfvenom is a command line instance of Metasploit that is used to...
  13. How To Backdoor Windows Executables Using Metasploit (Msfvenom)

    Today, we’re going to create windows executable backdoor using Metasploit Exploitation Framework’s using msfvenom. How To Backdoor Windows Executables Using Metasploit First make sure Metasploit is already installed. If you’re using Mac/Linux you can install Metasploit by using this method...
  14. How To Remotely Install Keylogger on your Girlfriends Computer?

    Welcome back, Hackers! Many of you guys have emailed me asking about remotely hacking your victim’s computer. So the answer to this is “YES” it is possible. I have seen a lot of you guys have commented on our website. I’ll show you how to install Keylogger on your Husband’s, Wife’s, Girlfriend’s...
  15. Exploit and Backdoor Windows 7,8,10 Bypass Antivirus FUD

    Exploit and Backdoor Windows: I’m back with another tutorial on Hacking Windows 7,8,10 Bypass Antivirus 100% FUD. I’m using shellter AV Evasion tool along with FileZilla.exe server to bind a payload with it. Let’s get started! This tutorial is for Windows, Mac, Linux. Things you need to...
  16. List of Metasploit Commands - Cheatsheet

    Metasploit was created by H. D. Moore in 2003 as a portable network tool using Perl. By 2007, the Metasploit Framework had been completely rewritten in Ruby. On October 21, 2009, the Metasploit Project announced that it had been acquired by Rapid7, a security company that provides unified...
  17. Embedded Payload with Image - Undetectable Backdoor

    Welcome to Hack Today, Let’s start by Embedding Undetectable Payload with an Image. A tool which is design for attackers to perform phishing or social engineering attacks by generating fake image with embedded backdoor with .bat/.exe etc.. extension. Let’s get started! Download...
  18. Msfvenom - Metasploit Payloads Cheat Sheet

    Often one of the most useful (and to the beginner underrated) abilities of Metasploit is the msfpayload module. Multiple payloads can be created with this module and it helps something that can give you a shell in almost any situation. For each of these payloads you can go into msfconsole and...
  19. How to make Metasploit Persistent payload/backdoor in Termux

    What is the persistent payload? If you are using Metasploit and everything is going fine and suddenly the victim Restarts the phone or even kill the app the session will be disconnected. So you no longer can access the victim's phone and to access the phone again victim has to click on the app...
  20. Hack Android Phone Using Termux with Metasploit and Ngrok

    How to Hack android phone using Termux with Metasploit. In this post, we are going to learn about how to hack android phones using termux with Metasploit. You can just copy-paste the commands one by one in the termux app and it will work perfectly. NOTE: This post is only for educational...
Top