Metasploit Outside LAN

Metasploit without Port Forwarding – Outside LAN over Internet

Metasploit is one of the best security testing frameworks that helps pen-testers do more than just detecting issues and sniping down the vulnerabilities; it also gears up and arms the defenders to always stay one or two steps ahead of the game. Metasploit Framework is a collection of tools for generating and running exploit codes…

ReelPhish – Defeating Two Factor Authentication Tutorial
|

ReelPhish – Defeating Two Factor Authentication Tutorial

ReelPhish – Defeating Two Factor Authentication using Real Time Phishing Attack Social Engineering Human Beings and their vulnerabilities have always been one of the loop holes in IT security. Even though the technology; software, networks and hardware, have hardened, attackers are using common people, exploiting the lack of their knowledge to get what they want….

CVE-2017-11882 POC, Exploit Released – Skeleton in the Closet
|

CVE-2017-11882 POC, Exploit Released – Skeleton in the Closet

A 17 year old Vulnerability in Microsoft Word was disclosed recently tracked by CVE-2017-11882 which affected the major versions of Microsoft Office – Microsoft Office 2007 SP 3, Microsoft Office 2010 SP 2, Microsoft Office 2013 SP 1, and Microsoft Office 2016. This vulnerability allows attackers to run remote codes with the privileges of the…