BlueKeep is a software vulnerability affecting older versions of MS Windows. It poses a significant risk because it attacks the Operating System's RDP Protocol (Port 3389). An attacker who successfully exploits this vulnerability could execute arbitrary code on the target system. An attacker could then install programs; view, change, or delete data; or create new … Continue reading What is the BlueKeep vulnerability, an insight into the global statistics using Shodan.
This is an embedded Microsoft Office presentation, powered by Office Online. During the session, I will be demonstrating how a buffer overflow vulnerability is identified and exploited. You will need the following tools: Python, Immunity Debugger, Mona Modules and Vulnserver. The tutorial is broken down into the following: Setting up the Lab.Fuzzing (Sending bytes in … Continue reading Buffer Overflow, 32-bit example.
Title: Anti-Virus Evasion Techniques Location: Teesside University Event: Cyberfest Date: 13.09.18 This is an embedded Microsoft Office presentation, powered by Office Online.
Net Ethical Hacking & Hardware - Exploitation Techniques - Vulnerabilities Exploits & Payloads. Location: Teesside University
Title: Northumbria University - CyberClinic - WPA Cracking & Hashcat Date: 14.11.2018
So we have learned how to navigate a terminal and manipulate the files and folders within the terminal itself. Now the question is, how to we find files, and programs. Well funnily enough Debian comes packaged with some great commands for this, mainly: Locate (Finds files and directories) Which (Finds paths for specific programs) Find (Finds files … Continue reading Let’s learn Linux Commands (Part 3 – Finding Files on Kali)
So now we have learned how to move around the terminal in the previous post. Let's move onto manipulating files and folders. We will focus on the following commands, which I believe are the ones you will use the most on your hacking adventures. mkdir (Make Directory) touch (Create a file) mv (Move a File/Folder) … Continue reading Let’s learn Linux Commands (Part 2 – File/Folder Manipulation)
Now that we have the hacking lab setup. Let's move onto something a much more interesting, the linux command line. If you have never touched a linux machine before, that's fine. This post is primarily going to focus on commands that are absolutely vital to navigating a terminal. Let's start... PWD (Print Working Directory) The … Continue reading Let’s learn Linux Commands (Part 1 – Terminal Navigation)
Creating the NAT Network in Virtualbox In this post we will configure the network so that Kali and Metasploitable-2 are on an isolated NAT Network. The first thing we need to do is create the NAT in Virtualbox. Open Virtualbox. Click File. Click Preferences. On the left hand side, click on NETWORK. Click on the … Continue reading Setting up the Hacking Lab (Part 3 – Network Configuration)
In this post we are going to install the Metasploit 2 linux distribution. If you are thinking "What the hell is Metasploitable", i'm here to answer your question. Essentially Metasploitable is a purposely vulnerable machine. It's used to practice exploitation techniques, it's also perfect for new starters. While we will not be jumping into exploiting … Continue reading Setting up the Hacking Lab (Part 2 – Installing Metasploitable-2)