0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

How to Get Screen Captures Using Metasploit and Meterpreter
By: Multi Thinker
July 14, 2015

Hi Again,Today, using metasploit and meterpreter, I will tell you how to screen capture a victim's PC / applications.What we need is metasploit and meterpreter configured and opened. This step starts when we have any meterpreter session opened. Every time, after going to CMD, we have Meterpreter Session opened, don't ...

Tutorial: Packet Sniffing
By: Multi Thinker
July 14, 2015

Packet sniffing was never easy before. In the late 90's, we used tunneling, wire Shark, MITM and SSL Striping.After a payload of reversetcp in meterpreter, all we need is to use exploit " sniff "I assume you have msfconsole opened and configured.Let's begin...Location and using Windows SMB exploit:msf > use exploit/windows/smb/ms08067netapi Setting payload of reversetcp: ...

Meterpreter Backdoor
By: Multi Thinker
July 14, 2015

Meterpreter Backdoor requires a script named metsvc It's a list of useful commands use to interact with a victim's machine from a backdoor.To get that script, go to: https://www.phreedom.org/software/metsvc/ Ok, now I assume you downloaded the script and have configured the msfconsole for it.Let's start...After our session has been started in meterpreter metasploit ...

Meterpreter: Remote Desktop
By: Multi Thinker
July 14, 2015

As I said before, when we have session open in meterpreter or we have access to cmd, we can add rules for the firewall to accept our connection or to disable the firewall. Let's use method getgui -u -p: -u stands for username and -p stand for password. When we're in someone's computer cmd (command prompt), we ...

Pass The Hash
By: Multi Thinker
July 14, 2015

Hi once again,Using this method, all we need is an SMB ( LAN ) fully compromised PC user-name, as we have recently exploited WindowsXp SP 2. Now that we know his user-name, we need to move into the LAN to other PCs.Let's begin...Running the Metasploit console, I assume you have Metasploit opened and ...

Metasploit: Incognito Attack
By: Multi Thinker
July 14, 2015

Hi there,This is Metasploit part 1. In a recent article, we learned about the basics and a little bit of configuration. Here, we'll be a little more advanced. Meterpreter What's meterpreter? Meterpreter is a DLL injector, mostly used to hijack windows security. A list of commands can let us overtake security of Windows and make changes ...

The Unconventional Guide to Network Security 1.1
By: ram
July 10, 2015

Leveraging CompTIA’s list of Security+ Exam Objectives ( https://certification.comptia.org/docs/default-source/exam-objectives/comptia-security-sy0-401.pdf ), I'll go through each element and provide examples. This article covers the first domain, Network Security (1.0), with its first sub-heading (1.1). The examples are not in any particular order, preference, or recommendation. They’re just quick and ...

Definitions in CompTIA Security+ (German translation)
By: Laird
July 10, 2015

Sicherheitssysteme und Applikationen: All-in-one Security Appliance – Modulares System, mit verschiedenen Sicherheitslösungen:1. IPS - intrusion protection system, schützt vor großformatige Angriffe2. IDS - intrusion detection system, identifiziert Angriffe durch AngriffsmusterHost-basiert: auf jedem Rechner installiertNetzwerk-basiert: Ein Sensor überwacht das gesamte NetzHybrid: Mischung aus Host-basiert und Netzbasiert3. Web filtering (Content Filter) – Filterung bestimmter Inhalte ...

Definitions in CEH (German Translation)
By: Laird
July 10, 2015

Skills:                 Verstehen wie Computer arbeiten, sicherer Umgang mit verschiedenen OS,   Hardwarevorausetzungen der OS kennen, Kommunikation mit anderen Sicherheitsspezialisten Klassifikationen:                 Black Hat Hackers: kriminelle, auf persönlichen Profit ausGrey Hat Hackers:  Mischung  aus Black und White HatWhite Hat Hacker (Ethical Hacker): Beschützen mit ihren Computer skills            InformationssystemeSecurity Providing Organizations:  Organisation die Sicherheit für andere übernehmenStufen:Script kiddies: ...

PowerShell Exploit Using SEToolkit
By: ^Graff
July 10, 2015

PowerShell Exploit Using SEToolkit In this tutorial, I'm going to show you how you can compromise any Windows computer that has PowerShell installed on it. The scope of this tutorial is to: Show you how to open a Meterpreter session on a victim's computer. Help ...