Search
Metasploit
Learn about the most powerful and widely used tools for penetration testing and vulnerability exploitation.


Metasploit Basics for Hackers, Part 1: Getting Started with Metasploit
Welcome back, my aspiring cyber warriors! In this series, I will introduce you to the world's most popular hacking/pentesting platform,...
8 min read
69,532 views

It's Finally Here! Metasploit5 Basics for Hackers
It's finally here! Master OTW's Long Awaited Next Book Metasploit5 Basics for Hackers Master OTW's new book, following closely in the...
1 min read
4,043 views

Metasploit Basics, Part 5: Using Metasploit for Reconnaissance (nmap, EternalBlue, SCADA, and MS SQL
Welcome back, my rookie hackers! As you know, reconnaissance is a crucial part of the hacker/pentester's job. Without good...
4 min read
16,782 views


Metasploit Basics, Part 27: Compromising an Exim Email Server
Welcome back, my aspiring cyberwarriors! Email is one of the most important services and protocols in our daily digital life. Without it,...
4 min read
5,803 views


Metasploit Basics, Part 13: Exploiting Android Mobile Devices (Updated)
Welcome back, my budding hackers! The growth of the mobile device market has been dramatic over the past 10 years. From its birth in 2007...
5 min read
70,791 views


Metasploit Basics for Hackers, Part 24: The New Evasion Modules in Metasploit 5
Welcome back, my aspiring cyber warriors! With the release of Metasploit 5, one of the most notable changes has been the addition of a...
5 min read
15,937 views

Metasploit5 Basics, Part 4: Connecting and Using the postgresql Database with Metasploit
Welcome back, my aspiring Metasploit Cyber Warriors! In this series, we are exploring the power and features of the world's most popular...
5 min read
27,228 views


Metasploit Basics for Hackers, Part 25: Web Delivery with Linux/UNIX/OsX
Welcome back, my aspiring cyber warriors! Metasploit, one of my favorite hacking/pentesting tools, has so many capabilities that even...
3 min read
3,945 views


Metasploit Basics, Part 16: Metasploit SCADA Hacking
Metasploit is widely recognized as a powerful tool to conduct penetration testing and hacking on traditional IT systems, but few people...
5 min read
15,302 views


Metasploit Basics, Part 9: Using msfvenom to Create Custom Payloads
At times, we may want to create a custom payload (for more on Metasploit payloads, see Metasploit Basics, Part 3: Payloads). For...
5 min read
43,259 views

Metasploit Basics, Part 20: Creating a Fake SMB Server to Capture Credentials
In a previous tutorials in this Metasploit Basics series, we learned how to use hashdump to pull password hashes from a local system....
3 min read
5,806 views


Metasploit Basics, Part 23: Remote Windows Forensics with Metasploit
Welcome back, my Metasploit Cyber Warriors! Although Metasploit is an "exploitation framework" primarily used for hacking and...
5 min read
3,593 views

Metasploit Basics: Installing Metasploit 5 into Kali 2018 and New Features
Welcome back, my aspiring Metasploit Cyber Warriors! Recently, Rapid7, the developers of the world's most popular exploitation framework...
4 min read
3,728 views

Metasploit Basics, Part 22: Exploiting and Controlling a System When You Have Physical Access
Welcome back, my aspiring cyber warriors! Much of what we have done here in this Metasploit Basics series enables us to exploit and...
4 min read
3,729 views


Metasploit Basics, Part 21: Capturing Credentials with mimikatz
Metasploit is such a powerful tool that I can only scratch the surface of its capabilities here. As it has developed over the years, it...
4 min read
34,076 views


Metasploit Basics, Part 19: Web Delivery for Windows
Welcome back, my Metasploit aficianodos! In the previous part of this series, we looked at how to use Metasploit's web delivery exploit...
3 min read
2,478 views

AutoSploit: The Powerful Marriage of Shodan and Metasploit!
Welcome back my rookie hackers! Every so often, I run across a new hacking tool that really gets me excited. Autosploit is one of those!...
3 min read
6,046 views


Metasploit Basics, Part 17: Automobile Hacking with Metasploit
Automobile or car hacking is the leading edge of the hacking/penetration testing field. With the arrival of self-driving cars in the very...
4 min read
3,143 views


Metasploit Basics, Part 15: Post- Exploitation Fun (Web Cam, Microphone, Passwords and more)
Welcome back, my fledgling hackers! As we have progressed through this series on Metasploit Basics, we have used numerous techniques to...
7 min read
39,914 views


Metasploit Kung-Fu Videos Now For Sale!
So many people have asked us for the Metasploit Kung-Fu course videos, we are now putting them on sale! If you just want to become...
2 min read
226 views