Search
Metasploit
Learn about the most powerful and widely used tools for penetration testing and vulnerability exploitation.

3 min read
Metasploit Basics, Part 18: Marrying the Power of Shodan with Metasploit
Welcome back my rookie hackers! Every so often, I run across a new hacking tool that really gets me excited. Autosploit is one of those!...
2,339 views

2 min read
Metasploit Basics, Part 14: Updating the msfconsole
Welcome back my novice hackers! Recently, I have received numerous questions regarding how to update the msfconsole built into Kali....
97,591 views


3 min read
Metasploit Basics, Part 12: Creating RC Scripts
In this series, I have been trying to familiarize you with the many features of the world's best framework for exploitation, hacking, and...
8,810 views

2 min read
Metasploit Basics, Part 11: Exploiting Fileformat Vulnerabilities in MS Office
Welcome back, my fledgling hackers! As the operating system developers become more and more security conscious, operating system exploits...
7,152 views


3 min read
Metasploit Basics, Part 10: Pivoting to Compromise the Network
Welcome back, my Metasploit aficionados! In this series, we began with the Metasploit basics and have progressed through exploitation and...
5,428 views


4 min read
Automobile Hacking, Part 3: Metasploit for Car Hacking
Automobile or car hacking is the leading edge of the hacking/penetration testing field. With the arrival of self-driving cars in the very...
16,213 views


4 min read
Metasploit Basics: Car Hacking with Metasploit
As part of this rapid development in automobile/car hacking, one of my favorite hacking tools, Metasploit, has developed the capability...
3,601 views


1 min read
Metasploit Framework Updated to Hack Cars!
The powerful hacker exploitation framework, Metasploit, has recently been updated with attacks against automobiles. This is HUGE, as...
1,665 views


3 min read
Metasploit Basics, Part 8: Exploitation with EternalBlue
Welcome back, my aspiring hackers! The Metasploit framework has become a multipurpose pentesting tool--but at its heart--it's an...
34,140 views


3 min read
Metasploit Basics, Part 7: Adding a New Module (EternalBlue)
Welcome back, my greenhorn hackers! Often, new modules are developed for Metasploit, but are not included in the base configuration or...
55,133 views

2 min read
Metasploit Basics, Part 6 :The Armitage Metasploit User Interface
Welcome back, my aspiring White Hat Hackers! In this series on the world's most popular exploitation framework, Metasploit, we have...
6,590 views


4 min read
Metasploit Basics, Part 3: Payloads
Welcome back, my tenderfoot hackers! ​ As you know, Metasploit is an exploitation framework that every hacker should be knowledgeable of...
13,701 views


4 min read
Metasploit, Part 2: Metasploit Module Types
In my first article in this Metasploit series, I introduced you to some of the key commands you need to know before using Metasploit. In...
15,522 views


1 min read
SCADA Hacking: Metasploit SCADA Modules
As a penetration tester/hacker, we have many resources we can use to test SCADA/ICS system security. One of the most popular is the...
10,968 views


4 min read
Using FOCA to Gather Website Metadata
My preference for Linux as a hacking platform is well documented, and I have even created a series of tutorials to train new hackers....
6,342 views

7 min read
Metasploit
This section will be dedicated to training you on Metasploit. Metasploit is THE most popular hacking framework in the world and it is...
941 views