Pass the Hash with Metasploit
Hello,
We have got new 9 minutes of pwnage for you to enjoy in our Youtube channel
Hello,
We have got new 9 minutes of pwnage for you to enjoy in our Youtube channel
Hello everyone, new week, new video.
Here you can see the difference between using staged and non staged shellcodes from a functional point of view and under the perspective of a pentester who wants to evade AV’s. Then we dive into msfencode and its usage to bypass AV’s.
There’s a new video in our Youtube channel.
We are keeping up with our promise to deliver one free pentesting video every week.
So if you have not subscribed yet:
The new video will deal with Msfpayload, a handy utility shipped with Metasploit that lets you use shellcodes (payloads) and builds stand alone executables around them.
What’s new today? We have just opened our Youtube channel! And the best part is that we will host video tutorials and live hacking examples done by our students, for our students.
Someone says that the best way to learn is by teaching.
We’ve heard your suggestions, we’ve applied a number of bug fixes and improvements to our first version of the Penetration testing course Professional and released another updated version of our course:
It is amazing to see how many people are willing to employ much of their spare time noting down bugs and improvements.
Vipin Kumar and Nitin Kumar, authors of the system security section, covered shellcoding step by step and in great detail.
Now we are in trouble. Research from Matousec has revealed a means by which a hacker would be capable of disabling dozens of modern AV’s including McAfee, Symantec, and friends.
Thank you, Google! A new and very effective way to learn web application security from the developer’s point of view has been announced: Jarlsberg (link no longer available).
The vulnerable application created by Google is coded in Python and was created for pentesters or web developers to practice hacking from different perspectives such as black box testing and whitehat testing through code inspection (addressed to Python coders).
When I called two friends, Brett and Vipin, to coauthor the Penetration Testing Professional training course, I didn’t intend for them to work one full year, night and day.