|
You are here |
blog.g0tmi1k.com | ||
| | | | |
linuxsecurityblog.com
|
|
| | | | | Metasploit is a popular exploitation framework that has seen plenty of coverage on ethicalhacker.net. This article introduces Armitage, a new GUI for Metasploit built around the hacking process. Today, I will show you how to use Armitage to scan a Linux host, find the right exploit, exploit the host, and handle post-exploitation. By following this... | |
| | | | |
taeluralexis.com
|
|
| | | | | We'll target a network comprising 3 machines, leveraging CVE exploits, pivoting, code obfuscation techniques, and AV bypass strategies. | |
| | | | |
eapolsniper.github.io
|
|
| | | | | [AI summary] The blog post discusses a critical security vulnerability in Splunk Universal Forwarders, allowing attackers to exploit weak passwords and API access to gain SYSTEM or root privileges on networked systems. | |
| | | | |
www.code-intelligence.com
|
|
| | | A dynamic stack buffer overflow vulnerability in the Abseil C++ library (abseil-cpp) was autonomously identified through AI-enhanced fuzz testing using CI Fuzz's AI Test Agent. Learn more in this blog. | ||