Search
Metasploit
Learn about the most powerful and widely used tools for penetration testing and vulnerability exploitation.

Metasploit Basics, Part 18: Marrying the Power of Shodan with Metasploit
Welcome back my rookie hackers! Every so often, I run across a new hacking tool that really gets me excited. Autosploit is one of those!...
3 min read
2,362 views

Metasploit Basics, Part 14: Updating the msfconsole
Welcome back my novice hackers! Recently, I have received numerous questions regarding how to update the msfconsole built into Kali....
2 min read
97,712 views


Metasploit Basics, Part 12: Creating RC Scripts
In this series, I have been trying to familiarize you with the many features of the world's best framework for exploitation, hacking, and...
3 min read
8,851 views

Metasploit Basics, Part 11: Exploiting Fileformat Vulnerabilities in MS Office
Welcome back, my fledgling hackers! As the operating system developers become more and more security conscious, operating system exploits...
2 min read
7,174 views


Metasploit Basics, Part 10: Pivoting to Compromise the Network
Welcome back, my Metasploit aficionados! In this series, we began with the Metasploit basics and have progressed through exploitation and...
3 min read
5,470 views


Automobile Hacking, Part 3: Metasploit for Car Hacking
Automobile or car hacking is the leading edge of the hacking/penetration testing field. With the arrival of self-driving cars in the very...
4 min read
16,290 views


Metasploit Basics: Car Hacking with Metasploit
As part of this rapid development in automobile/car hacking, one of my favorite hacking tools, Metasploit, has developed the capability...
4 min read
3,618 views


Metasploit Framework Updated to Hack Cars!
The powerful hacker exploitation framework, Metasploit, has recently been updated with attacks against automobiles. This is HUGE, as...
1 min read
1,676 views


Metasploit Basics, Part 8: Exploitation with EternalBlue
Welcome back, my aspiring hackers! The Metasploit framework has become a multipurpose pentesting tool--but at its heart--it's an...
3 min read
34,201 views


Metasploit Basics, Part 7: Adding a New Module (EternalBlue)
Welcome back, my greenhorn hackers! Often, new modules are developed for Metasploit, but are not included in the base configuration or...
3 min read
55,266 views

Metasploit Basics, Part 6 :The Armitage Metasploit User Interface
Welcome back, my aspiring White Hat Hackers! In this series on the world's most popular exploitation framework, Metasploit, we have...
2 min read
6,620 views


Metasploit Basics, Part 3: Payloads
Welcome back, my tenderfoot hackers! ​ As you know, Metasploit is an exploitation framework that every hacker should be knowledgeable of...
4 min read
13,749 views


Metasploit, Part 2: Metasploit Module Types
In my first article in this Metasploit series, I introduced you to some of the key commands you need to know before using Metasploit. In...
4 min read
15,593 views


SCADA Hacking: Metasploit SCADA Modules
As a penetration tester/hacker, we have many resources we can use to test SCADA/ICS system security. One of the most popular is the...
1 min read
11,004 views


Using FOCA to Gather Website Metadata
My preference for Linux as a hacking platform is well documented, and I have even created a series of tutorials to train new hackers....
4 min read
6,388 views

Metasploit
This section will be dedicated to training you on Metasploit. Metasploit is THE most popular hacking framework in the world and it is...
7 min read
949 views