It’s a long way to the root if you wanna Rock and Roll!
Hi folks!
First of all, thank you for the massive attendance at the webinar. That was awesome!
For those who missed it, here you can find a recording of the session.
It’s a long way to the root if you wanna Rock and Roll!
On August 26th, our Security Researcher Davide Girardi, a.k.a. GiRa, will present an exploitation scenario on a typical company network. The exploitation will start from a Cross-Site-Scripting flaw in the company blog and will get us to a full Active Directory Administrator account.
Tools: Nessus, Metasploit, Nmap, proxychains.
Attention: In our tests proxychains works only on 32 bit Backtrack 5
One of the best features that Metasploit offers is the ability of “pivoting”. With this technique, an attacker can use a compromised machine as a “pivot” to attack other machines in the same or in other networks that the compromised host can reach.
Hello,
We have got new 9 minutes of pwnage for you to enjoy in our Youtube channel
Hello everyone, new week, new video.
Here you can see the difference between using staged and non staged shellcodes from a functional point of view and under the perspective of a pentester who wants to evade AV’s. Then we dive into msfencode and its usage to bypass AV’s.
There’s a new video in our Youtube channel.
We are keeping up with our promise to deliver one free pentesting video every week.
So if you have not subscribed yet:
The new video will deal with Msfpayload, a handy utility shipped with Metasploit that lets you use shellcodes (payloads) and builds stand alone executables around them.