Metasploit Basics, Part 11: Exploiting Fileformat Vulnerabilities in MS Office

Welcome back, my fledgling hackers! As the operating system developers become more and more security conscious, operating system exploits become rarer. Not so rare that we don’t see them anymore (see ExternalBlue and the .NET vulnerability CVE-2017-8759), but rare enough that hackers tend to focus their efforts on the applications and their output files for […]

Continue Reading

PowerSploit, Part 1: How to Control Nearly any Windows System with Powersploit

A few years back, Microsoft implicitly recognized the superiority of the Linux terminal over the GUI-based operating system by developing PowerShell. Since Windows 7, every Windows operating system has had PowerShell installed by default, and they even made PowerShell capable of running Linux commands on Windows! PowerShell is a powerful environment to get just about […]

Continue Reading

SCADA Hacking: Hackers-Arise First to Reveal Vulnerability Now Recognized by Schneider Electric and

Once again, Hackers-Arise receives international recognition in SCADA Hacking! On March 28, 2017, OTW detailed here how an attacker can get the Schneider Electric Modicom TM221 to spew out key information that an attacker can use to exploit the system. You can read about it here. Today, April 10, 2017, that vulnerability was recognized by […]

Continue Reading