Metasploit Basics, Part 23: Remote Windows Forensics with Metasploit

Welcome back, my Metasploit Cyber Warriors! Although Metasploit is an “exploitation framework” primarily used for hacking and penetration testing, it can also be used to provide some rudimentary forensic capabilities. It’s primary usefulness as a forensic tool is to gather evidence from a remote system when the physical system is unavailable to the investigator. In […]

Continue Reading

Metasploit Basics, Part 15: Post- Exploitation Fun (Web Cam, Microphone, Passwords and more)

Welcome back, my fledgling hackers! As we have progressed through this series on Metasploit Basics, we have used numerous techniques to exploit your target system including; 1. SMB Exploits (EternalBlue and MS08_067, for instance); 2. File Format (ms14-0440_sandworm, office_word_hta); 3. Browser Exploits (autopwn, Abobe Flash and numerous others); 4. Social Engineering Toolkit(SET); Custom Payloads with […]

Continue Reading