As we all know Metasploit is a huge framework and can be used to do a lot of tasks. In this article we will see how to use Metasploit’s auxiliary modules. These modules are very helpful in so many scenarios …
One of the most common questions that I get is “how do I become a hacker?”, the answer to this really depends on why you want to become a hacker? what are you trying to achieve? In this video I …
AlienVault OSSIM generates various alarms, it’s possible that the analyst would miss some of the alarms that could have a devastating impact on our infrastructure. To cater for this scenario, we developed a system for automated response to ensure that …
Today I will discuss the top 10 hacking tools used in 2019. These tools can be installed on most operating systems (Windows, Linux or OS X) and are easy to use. I compiled this list of tools based on their …
This video shows how to manually import exploits to the Metasploit framework, as an example we’ll import the apple mac os x feedback assistant race condition privilege escalation exploit CVE: 2019-8565, so the main aim here is to teach you …
Recently a Facebook announced that their popular messaging application Whatsapp has been vulnerable to a remote code execution for quite sometime now (CVE-2019-3568) , you should immediately update yours if you have it installed to 2.19.34 if you have an …