Posts

chapter 3 - Full Metasploit Tutorial from scratch **updated version 2023

Image
   Part 2 - Metasploit  Tutorial For the security testing community, Metasploit (and Metasploit Pro) is one of the coolest things since sliced bread. Metasploit gives you a complete framework, or playground for security testing. 

Learn about website's request and response

Image
what happens when you visit a website?

How to get on the dark web & find out best antivirus for Dark web.

Image
  Most people have heard of the dark web and the illicit marketplaces available on it. Those marketplaces – and the stories surrounding them – can make the dark web seem like a hive of criminality. Unfortunately, it is true that guns, drugs, stolen passports (and many other illegal wares) do proliferate in those stores. As a result, there are plenty of reasons why the average person might choose never to access the dark web. That said, there are reasons some people use the dark web legitimately. In this guide, we will look at some of those reasons and explain how to access the dark web if you need to.  How to get on the dark web Knowing how to access the dark web can be of significant benefit if you are trying to bypass censorship and gain access to information that has been blocked by the government. And it can allow you to exchange information securely if you are a whistleblower who wants to remain anonymous. You may be surprised to find out that connecting to the dark web is actuall

Chapter 4 – Meterpreter Shell

Image
Learn about Meterpreter shell. Resources ● http://en.wikiblogs.org/wiki/Metasploit/MeterpreterClient ● http://cyberarms.wordpress.com/2013/02/03/remotely-recording-speech-and-turning-it  into-searchable-text-with-metasploit-watson/ Introduction After a successful exploit a Meterpreter shell allows you to perform many different functions along  with a full remote shell. Meterpreter is great for manipulating a system once you get a remote connection, so depending on  what your goals are; a Meterpreter shell is usually preferred to a straight remote terminal shell. Meterpreter gives us a set of commands and utilities that can be run to greatly aid in security  testing. For  example, there are commands to pull the password hashes and gather data & settings from the  system. There are also some fun tools included in Meterpreter, for example, you can turn on the user’s  webcam and grab still shots, you can turn on the remote microphone and even grab desktop  screenshots of what the user