Skip to main content

METASPLOIT_UNLEASED-INTRODUCTION(CREAT PENTESTING LAB)



Hello Friends,

               this is zerocool...welcome back to HACKER_HEAVEN.
today ia m gonna show you how to use the METASPLOIT_FRAMEWORK to compromised victim system.
ok first of all i apologized for long vacation from blogger...but dont worry guys i have a lot of thing to show you right now....

so..i just started an tutorial series in the youtube channel about the  METSPLOIT_UNLEASED.

so i think you guys excited about it...

ok right now i am gonna write the articles as well the videos too..

so just stick with me...
-------------------------------------------------------------------

                              METASPLOIT
created by: HD MOORE
written in: RUBY LANGUGE
community support: rapid7 community

-------------------------------------------------------------------
in this whole tutorial series we will used only pentesting along with little with theory portion.
so for the pentesting first we required the pentesting lab..

here is the video which explain all the things...

i hope you will like it..

plese subscribe,like share and off-course comment your queiry too..

bye bye...zerocool sign out..

-----------------------------------------------------------------------------------------------------------------

Popular posts from this blog

DEEP SOUND -STEGNOGRAPHY

In the series of the steganography ..today we are going to discuss the hiding of data in the music file through the help of the window based tool name       "DEEP SOUND" ..now a days very famous TV series name             Mr. Robot . . off course i am  fan of this show..where elliot use this tool for hiding his secret data.. read previous article on steganography                                                         so without wasting much time lets start .. 1.install the DEEP SOUND go to the official website of the deep sound and download it to your machine.  and open up the interface of the deep sound. 2. setting click on the setting gear icon, an pop-up window show up...where languge remain same as english,           change your output  directory ..like i change it to the documents by browsing the folder. after that check the box for encrypt files .. after that it will ask for the password.. input your password for the sec

KALI LINUX -SECURITY ,CONFIGURATIO AND UPDATES

      Configuring network services and  secure  communications The first step in being able to use Kali is to ensure that it has connectivity to either a wired or wireless network to support updates and customization. You may need to obtain an IP address by DHCP (Dynamic Host Configuration Protocol), or assign one statically. First, confirm your IP address using the  command  ifconfig command from a terminal window, as shown in the following screenshot: IP address is 192.168.1.11.... If an IP address was not obtained, an address can be assigned by DHCP using the command dhclient eth0 (or other available interfaces, which will depend on the  specific configuration of the system being used). If a static IP address is used, additional information may be required. For example, you can assign a static IP of 192.168.1.11as follows:                     inet addr:192.168.1.11            Bcast:192.168.1.255            Mask:255.255.255.0        Securing com

EVERY LINUX_ADMIN-COMMANDS TO BE KNOW

Hello Friends,             in todays article i am gonna cover the most used 16 linux commands,every linux admin should know it.in the whole article i just show the uses of all the commands and their additional attributes too.