Metasploit

Pentesting Windows Using Microsoft Office DDE Exploit (MACROLESS)

DDE exploit also known as dynamic data exchange, allows data to be transferred between applications without any interaction from the…

1 year ago

Exploit Windows Remote PC with EternalBlue & DoublePulsar Exploit through Metasploit

EternalBlue Malware was Developed by National Security Agency (NSA) exploiting Windows-based Server Message Block (SMBv1) it is believed the tool…

1 year ago

How to Launch a DoS Attack by using Metasploit Auxiliary

Most DDOS Attacks target Enterprise Networks so implementing DDoS Protection in Enterprise networks is a more important concern. An organization…

1 year ago

Microsoft Warns of More BlueKeep RDP Attacks to Deploy CoinMiner Malware – Patch Now!!

Microsoft Urges users to patch for BlueKeep RDP vulnerability as it could result in more effective attacks. The Bluekeep exploit…

5 years ago

Hackers Embedded the Malicious Code Within WAV Audio Files to Gain Reverse Shell Access

Researchers observed a new malware campaign using WAV audio files to hide the malware and to avoid detection. Threat actors…

5 years ago

Turla Mosquito Hacking Group Exploiting Backdoor Using Metasploit To Compromise the Target System

Turla cyber espionage group leveraging Powerful Mosquito backdoor using open source exploitation framework Metasploit for an initial stage of the attack on…

7 years ago

Metasploit Can Be Directly Used For Hardware Penetration Testing Now

Security researchers and penetration testers have used the open source Metasploit Framework to probe for vulnerabilities, run exploits, and simulate…

7 years ago