Scan for a vulnerable device using Nessus and exploit one of the vulnerabilities found.
-
Updated
Jun 12, 2021
Scan for a vulnerable device using Nessus and exploit one of the vulnerabilities found.
Python exploit for vsftpd 2.3.4 - Backdoor Command Execution
Praktek eksploitasi service jaringan komputer dengan vulnerable machine metasploitable 2
objective of this assessment is to perform an internal network penetration test on the specified Personal network. The task requires following a comprehensive and systematic approach to achieve the desired outcomes. This test aims to simulate a real-world penetration test within the provided testing environment.
Laboratorio Seguridad de la informacion.
Fixed host↔guest host‑only networking between a Kali host (vboxnet0) and a Metasploitable2 guest (eth1) by either enabling host DHCP or assigning a persistent static IP on the guest. Includes quick commands for snapshotting, enabling DHCP on the host, static guest configuration,
La documentación de mi proyecto de síntesis realizado en el grado medio de formación profesional "SMR", presentado el mayo del 2023. GitHub es para backups, para leer en formato correcto usa GitBook, link debajo.
Simulando um Ataque de Brute Force de Senhas com Medusa e Kali Linux
Damn Vulnerable Web Application (DVWA) Pentesting Report – A detailed security assessment of DVWA covering vulnerability identification, exploitation techniques, and remediation strategies. Includes practical demonstrations of web security flaws such as SQL Injection, XSS, CSRF, Command Injection, and more, along with mitigation recommendations.
💻 Step-by-step guide to install and run Metasploitable 2 on Mac with Apple Silicon (M1/M2/M3) using UTM — ideal for ethical hacking labs, penetration testing practice, and cybersecurity students.
This is a project involving the setting up a penetration testing environment using Kali Linux and Metasploitable2 to practice and exploit common vulnerabilities such as SQL Injection, Command Injection, and Cross-Site Scripting (XSS). Tools used include Nmap, BurpSuite, and SQLmap.
Add a description, image, and links to the metasploitable-2 topic page so that developers can more easily learn about it.
To associate your repository with the metasploitable-2 topic, visit your repo's landing page and select "manage topics."