Second Issue of Exploit Mag is out!

The second free issue of Exploit Magazine has been released!

This month’s issue highlight’s three articles written by, well… yours truly!

(Guys we really need more contributors. Help the security community out and share your knowledge! Contact me at cyberarms (at) Live.com for more info.)

Included are updated versions of my Pentesting with Metasploitable 2 article series, Security Testing with Powershell and Powerpoint, and a short article on Listening to VoIP calls with WireShark:

Practice Pentesting with Metasploitable 2

You have been learning some mad hacking skills, but how do you test them? Wouldn’t it be great if there was a system that came with vulnerabilities that you could try to exploit? Well, there is, meet Metasploitable 2!

In this article we will take a look at the purposefully vulnerable Linux system and learn how to exploit it. We will cover scanning a system, using a remote exploit to get root access, cracking the passwords, and then using the passwords to exploit all the systems on the network.

Security Testing with PowerShell and PowerPoint

Many times hackers think “Out-of-the-Box” and manipulate common services and programs to exploit a system. In this article we will look at gaining remote shells with PowerShell through the Social Engineering Toolkit and how to get remote user credentials via PowerPoint.

Listening to VoIP Calls from Packet Captures

In this article we will look at recovering and playing voice calls from nothing more than a network packet capture that includes VoIP traffic.

How difficult would it be to scan a packet capture, find the calls out of the thousands of available packets and be able to somehow listen to the call? Well, come to find out, it is not hard at all. The feature is built into Wireshark!

Check it out!

Advertisements

Free Issue of Exploit Magazine Released!

Check out the new Exploit Magazine! The first issue of the Exploit Magazine has just been published. It is totally devoted to Metasploit Framework.

  • Metasploit Framework – Demystified: Introduction to Metasploit Framework
  • Metasploit Exploitation Samples

You can download the magazine for free after registering as a free user. I hope that you will enjoy the content. Register now and enjoy future free issues of the Exploit Magazine:

http://theexploitmag.com/category/magazine

Exploit Magazine is looking for authors!

Are you a computer security expert or researcher that knows a thing or two about exploits and exploit defense? Share you knowledge with the community!

Contact me at cyberarms(at)live.com for more information.