Search
Metasploit
Learn about the most powerful and widely used tools for penetration testing and vulnerability exploitation.
8 min read
Metasploit Basics for Hackers, Part 1: Getting Started with Metasploit
Welcome back, my aspiring cyber warriors! In this series, I will introduce you to the world's most popular hacking/pentesting platform,...
68,971 views
1 min read
It's Finally Here! Metasploit5 Basics for Hackers
It's finally here! Master OTW's Long Awaited Next Book Metasploit5 Basics for Hackers Master OTW's new book, following closely in the...
3,925 views
4 min read
Metasploit Basics, Part 5: Using Metasploit for Reconnaissance (nmap, EternalBlue, SCADA, and MS SQL
Welcome back, my rookie hackers! As you know, reconnaissance is a crucial part of the hacker/pentester's job. Without good...
16,377 views
4 min read
Metasploit Basics, Part 27: Compromising an Exim Email Server
Welcome back, my aspiring cyberwarriors! Email is one of the most important services and protocols in our daily digital life. Without it,...
5,671 views
5 min read
Metasploit Basics, Part 13: Exploiting Android Mobile Devices (Updated)
Welcome back, my budding hackers! The growth of the mobile device market has been dramatic over the past 10 years. From its birth in 2007...
70,396 views
5 min read
Metasploit Basics for Hackers, Part 24: The New Evasion Modules in Metasploit 5
Welcome back, my aspiring cyber warriors! With the release of Metasploit 5, one of the most notable changes has been the addition of a...
15,847 views
5 min read
Metasploit5 Basics, Part 4: Connecting and Using the postgresql Database with Metasploit
Welcome back, my aspiring Metasploit Cyber Warriors! In this series, we are exploring the power and features of the world's most popular...
26,681 views
3 min read
Metasploit Basics for Hackers, Part 25: Web Delivery with Linux/UNIX/OsX
Welcome back, my aspiring cyber warriors! Metasploit, one of my favorite hacking/pentesting tools, has so many capabilities that even...
3,895 views
5 min read
Metasploit Basics, Part 16: Metasploit SCADA Hacking
Metasploit is widely recognized as a powerful tool to conduct penetration testing and hacking on traditional IT systems, but few people...
15,134 views
5 min read
Metasploit Basics, Part 9: Using msfvenom to Create Custom Payloads
At times, we may want to create a custom payload (for more on Metasploit payloads, see Metasploit Basics, Part 3: Payloads). For...
42,540 views
3 min read
Metasploit Basics, Part 20: Creating a Fake SMB Server to Capture Credentials
In a previous tutorials in this Metasploit Basics series, we learned how to use hashdump to pull password hashes from a local system....
5,774 views
5 min read
Metasploit Basics, Part 23: Remote Windows Forensics with Metasploit
Welcome back, my Metasploit Cyber Warriors! Although Metasploit is an "exploitation framework" primarily used for hacking and...
3,539 views
4 min read
Metasploit Basics: Installing Metasploit 5 into Kali 2018 and New Features
Welcome back, my aspiring Metasploit Cyber Warriors! Recently, Rapid7, the developers of the world's most popular exploitation framework...
3,692 views
4 min read
Metasploit Basics, Part 22: Exploiting and Controlling a System When You Have Physical Access
Welcome back, my aspiring cyber warriors! Much of what we have done here in this Metasploit Basics series enables us to exploit and...
3,694 views
4 min read
Metasploit Basics, Part 21: Capturing Credentials with mimikatz
Metasploit is such a powerful tool that I can only scratch the surface of its capabilities here. As it has developed over the years, it...
33,600 views
3 min read
Metasploit Basics, Part 19: Web Delivery for Windows
Welcome back, my Metasploit aficianodos! In the previous part of this series, we looked at how to use Metasploit's web delivery exploit...
2,441 views
3 min read
AutoSploit: The Powerful Marriage of Shodan and Metasploit!
Welcome back my rookie hackers! Every so often, I run across a new hacking tool that really gets me excited. Autosploit is one of those!...
5,844 views
4 min read
Metasploit Basics, Part 17: Automobile Hacking with Metasploit
Automobile or car hacking is the leading edge of the hacking/penetration testing field. With the arrival of self-driving cars in the very...
3,088 views
7 min read
Metasploit Basics, Part 15: Post- Exploitation Fun (Web Cam, Microphone, Passwords and more)
Welcome back, my fledgling hackers! As we have progressed through this series on Metasploit Basics, we have used numerous techniques to...
39,742 views
2 min read
Metasploit Kung-Fu Videos Now For Sale!
So many people have asked us for the Metasploit Kung-Fu course videos, we are now putting them on sale! If you just want to become...
220 views