-
Recent Posts
Categories
- Academia (21)
- Android (1)
- Anti-Forensics (2)
- AntiX (4)
- Apache/Tomcat (8)
- Arabnix (6)
- BackTrack (5)
- Books (17)
- C5W (1)
- Challenges (5)
- Companies (16)
- Conferences (1)
- Cyber 5W (2)
- Database (23)
- Development (31)
- DFIR (14)
- Exploitation (8)
- File Systems (1)
- Firewalls (20)
- Footprinting (14)
- Forensics (22)
- Fun (28)
- GNU/Linux (101)
- HDFS (1)
- IDS/IPS (4)
- Investigations (13)
- Kernel (24)
- Life (161)
- Linux Security (68)
- Linux Services (37)
- Malware (9)
- Memory (1)
- Metasploit (6)
- Mobile (3)
- Networks (44)
- News (75)
- OSINT (6)
- Patch Management (5)
- PCI Compliance (8)
- PenTest (52)
- Poems (9)
- PortKnocking (10)
- Privacy (4)
- Publications (12)
- Real Madrid (17)
- Research (6)
- Security (84)
- Snippets (33)
- Social Engineering (4)
- Software/Tools (53)
- Sport (78)
- ThreatHunting (4)
- Unix (12)
- Virtualization (27)
- Vulnerability (7)
- Web Security (12)
- Webapp (4)
- WHM/Cpanel (6)
- Windows (19)
- Workshops (2)
- z0ne (16)
Archives
Category Archives: Metasploit
Can We Say Farewell to Hiding Malicious EXEs in Stealth ADS
One of my current students asked if using Stealth Alternate Data Streams (ADS), could bypass AVs? Therefore, I wanted to prove that for the student by doing a simple experiment. What was done is the following: 1. Turned off Windows … Continue reading →
Posted in AntiX, Forensics, Malware, Metasploit, Windows
|
Tagged ads, anti-forensics, anti-virus, AV, meterpreter, reverse shell, stealth
|
Comments Off on Can We Say Farewell to Hiding Malicious EXEs in Stealth ADS
Offensive Software Exploitation Course
During this semester, which technically ends on Sunday 11:59 pm (5/5/2019), I taught this course at the college for a nice group of students. The course has nothing secret and no zero days were found LOL. But, still I think … Continue reading →
Posted in Academia, Exploitation, Metasploit, PenTest, Security, Vulnerability
|
Tagged Course, Egghunter, Exploitation, Hacking, Metasploit, Pentesting, Post Exploitation, Retrurn Oriented Programming, ROP, SEH, Software Exploitation
|
Comments Off on Offensive Software Exploitation Course
الجزء السابع من محاضرات HTID
نسيت أقم بوضع هذا الإعلان بصراحة … ربما لإنشغالي بالإمتحانات النهائية لهذا الفصل الدراسي … على كل حال، هذا الجزء كان عن ميتاسبلويت Metasploit Framework … حاولت قدر الإمكان أن أوضح جميع التفاصيل الخاصة في الأداة … ما لم يسعفني … Continue reading →
Posted in Academia, Exploitation, Forensics, Metasploit, PenTest, Publications
|
Tagged Demo, Exploitation, Forensics, Metasploit Framework, Post
|
Comments Off on الجزء السابع من محاضرات HTID
SMB Scanning بواسطة Metasploit
حين تم تطوير Metasploit كان الهدف هو خلق بيئة متكاملة للمهاجم لتنفيذ هجومه على الهدف … من بين تلك الأهداف هي عمل Modules متخصصة في جزئيات معينة تسهل عليك الوصول الى الضحية … وكذلك حسب كتاب Metasploit الأخير، يقولون ليس … Continue reading →
Posted in Footprinting, Linux Services, Metasploit, PenTest, Windows
|
Tagged auxiliary, Metasploit, Scanning, SMB, smb_version
|
Comments Off on SMB Scanning بواسطة Metasploit
Using Metasploit to Detect Idle Hosts
تعتبر طريقة الفحص التي تسمى IDLE Scan ربما الى اليوم أحد أقوى طرق الفحص وذلك لأنه يمكن عملها ومن دون أن يرسل المهاجم ولا حُزمة واحدة الى الهدف وبالتالي ممكن تتجاوز فيها الكثير من الأمور، وأيضاً الفحص بشكل سري وغير … Continue reading →
Posted in BackTrack, IDS/IPS, Metasploit, Networks, PenTest
|
Comments Off on Using Metasploit to Detect Idle Hosts