metasploit

6 Techniques to analyze the vulnerability scan report in Metasploit

vulnerability scan report in Metasploit After the scan has finished, click on the “Overview” tab from the maintenance bar at the top point of the site. In the Discovery segment, one host was scanned, has 30 or more services, and no less than 1 vulnerability. It’s great to note that these results are from stand Read more about 6 Techniques to analyze the vulnerability scan report in Metasploit[…]

Metasploit Modules in Kali Linux

6 Metasploit Modules – You should know

Metasploit Modules in Kali Linux Metasploit modules are main components of  Metasploit. The Metasploit Project is a computer security extend that gives data about security vulnerabilities and supports in penetration testing. The Framework breaks down into the module sorts: 1. Exploit Modules 2. Auxiliary Modules 3. Payloads 4. Listeners 5. Shellcode 1. Exploit Modules Exploit Read more about 6 Metasploit Modules – You should know[…]

How to use metasploit pro in Kali Linux

How to use metasploit pro in Kali Linux

Hello and welcome on my blog CyberPedia I am happy to see you on my blog I am going to write in this article about how to use metasploit web interface How to use Metasploit Framework for Security Testing Security is a big concern for an organization, So most of companies hires Pen tester or Read more about How to use metasploit pro in Kali Linux[…]

Anonymous ‘Curing the Virus’ or a renegade threat

  Total Curing against VIRUS (terrorism) prompted anonymous to take down 20,000 twitter accounts that were linked to the IS that is In Sewage #IslamicStateInSewage. Or as they claim, maybe its real…I don’t think its a fluke because its bad-ass. so for me I am believing that its true. All this comes up as #OpParis after Read more about Anonymous ‘Curing the Virus’ or a renegade threat[…]

How to Configure Wireless Cards In Linux_image

How to Configure Wireless Cards In Linux

Configuring the wireless card can be accomplished using Graphical mode described before during the GUI configuration of the Network card. In This case Select Wireless tab in the Network Connections Pop up box instead of selecting wired tab. Click on the Add button from this tab, which will display a dialog box with title “Wireless Read more about How to Configure Wireless Cards In Linux[…]

Steps of Penetration Testing

All Right all right. now we all know “what is Penetration Testing?”, “Why it is needed?”. Now its time for ‘How it is done?’    There are four basic steps of Penetration Testing…….Well the fifth one is filing the report but you don’t need to know THAt!! SO, 5 steps of awesomeness. These steps area Read more about Steps of Penetration Testing[…]

Working on Kali Linux!!

Kali Linux is the best pen-testing software in existence. In Movies I thought they were using windows but HELL no!! Linux it was. In line with pen-testing, it makes you feel a lot smarter. So, without further a do, LETS BEGIN!! 1. Main window: That’s what it looks like. the other articles have already shown Read more about Working on Kali Linux!![…]

What The Hell Is Penetration Testing??

Ten years ago talk about penetration to a 12 year old, what answer would you have gotten? Penetration is trying to go through a wall whose door is not open, using drilling or hacking or  beating your head to it in hopes that you don’t get hurt. Now what about penetration testing, to that even our Read more about What The Hell Is Penetration Testing??[…]