Quantcast
Channel: Pax Pentest » Virtual Hacking Lab
Browsing latest articles
Browse All 34 View Live

Metasploit Meterpreter: MS11-006 Client-Side Malicious Document Exploit –...

I’m following instruction given in Metasploit: The Penetration Tester’s Guide - Chapter 8 (Exploitation Using Client-Side Attacks). Details of the target machine on my Virtual Hacking Lab: Windows XP...

View Article


Learning Nmap Security Network Port Scanner: Service and Application Version...

This is the sixteenth post detailing my notes on Nmap Network Scanning. Following on from the last Nmap post on service and application version detection, Nmap considers rarity and probes of high...

View Article


Metasploit: My first use of Auxiliary Modules

Chapter nine of Metasploit: The Penetration Tester’s Guide moves into auxiliary modules. Here’s a snippet from the book: In addition to providing valuable tools such as port scanners and service...

View Article

Learning Nmap Security Network Port Scanner: Remote Operating System...

This is the eighteenth post detailing my notes on Nmap Network Scanning. Although the inner working of OS detection are complex, it’s very easy to use.and the results very comprehensive. Here is scan...

View Article

Image may be NSFW.
Clik here to view.

Detecting Nmap ARP Scan (-PR) in Wireshark

This is the first in a series of posts looking at detecting Nmap scans in Wireshark. I’m being guided by Chapter 31 of Wireshark Network Analysis entitled: “Detect Scanning and Discovery processes“....

View Article


Image may be NSFW.
Clik here to view.

Detecting Metasploit Armitage attacks in Security Onion Via a Dualcomm...

Back from holiday and managed to get my hands on an excellent cheap Dell laptop and a Dualcomm Network tap. I loaded the full Security Onion suite (Xubuntu 12.04 64-bit) on the Dell laptop and rigged...

View Article

Image may be NSFW.
Clik here to view.

Metasploit: My First Successful Armitage Exploit

I just completed my first successful exploit in the marvellous Metasploit GUI Armitage. Details of the target machine on my Virtual Hacking Lab: Windows XP Pro Service Pack 2 (unpatched). Firewall and...

View Article

Image may be NSFW.
Clik here to view.

Seting up a simple backdoor shell using Ncat via Metasploit Armitage

First I exploited my Windows system with Metasploit Armitage obtaining a Meterpreter shell as per this post. Then I needed to upload the ncat.exe file (which I download from here) to the target...

View Article


Image may be NSFW.
Clik here to view.

Creating a persistent Ncap backdoor in Windows XP startup using Metasploit

I couldn’t figure out how to do this in Armitage and so had to resort to the good ol’ Terminal. I exploited the XP system as per this post and obtained an Meterpreter shell. First to upload the...

View Article


Ncat Reverse Shell (Shell Shovelling)

This will probably be my last Ncat post for now as I really must get on with other things. If you want a comprehensive Ncat tutorial then hop over to IronGeek. Ncat really is a superb tool. Previous...

View Article
Browsing latest articles
Browse All 34 View Live