YokerAI(@IATheYoker) 's Twitter Profile Photo

2 - Metasploit:
Metasploit es un marco de pruebas de penetración que simplifica el hacking. Sirve para validar vulnerabilidades y mejorar la seguridad. Es como una navaja suiza para la ciberseguridad.

account_circle
Renato T. Ashcar(@rtate72) 's Twitter Profile Photo

Well, I can say this one was a challenging one, but totally worthy: 3 months learning about Burp Suite, privilege escalation in windows and linux, android pentesting, forensics, nmap, metasploit and several attacks. Really broadened my horizon!

Well, I can say this one was a challenging one, but totally worthy: 3 months learning about Burp Suite, privilege escalation in windows and linux, android pentesting, forensics, nmap, metasploit and several attacks. Really broadened my horizon!
account_circle
Mahir Labib | The InfoSec Guy 🇧🇩 🇵🇸(@MahirLabibUtso) 's Twitter Profile Photo

Jenkins Penetration Testing

Jenkins is an open-source automation server used for continuous integration (CI) and continuous delivery (CD)

🎆Lab Setup
🎆Installation
🎆Configuration
🎆Enumeration
🎆Exploitation using Metasploit Framework
🎆Exploiting Manually (Reverse Shell) ↓

Jenkins Penetration Testing

Jenkins is an open-source automation server used for continuous integration (CI) and continuous delivery (CD)

🎆Lab Setup
🎆Installation
🎆Configuration
🎆Enumeration
🎆Exploitation using Metasploit Framework
🎆Exploiting Manually (Reverse Shell) ↓
account_circle
Laprovittera Carlos(@laprovittera) 's Twitter Profile Photo

🔥🔥🔥Se vienen nuevos Cursos y guías gratuitas:

🔥 Hardware para hacking
🔥 Ethical Hacking 2024
🔥 Pentesting de 0 a 100
🔥 Haking Web
🔥 Haking de Redes
🔥 Cybersecurity
🔥 Haging con Kali de 0 a 100
🔥 PowerShell
🔥 Nmap
🔥 Metasploit
🔥 TryHackMe Guía Completa!
🔥 Hacking…

🔥🔥🔥Se vienen nuevos Cursos y guías gratuitas:

🔥 Hardware para hacking
🔥 Ethical Hacking 2024
🔥 Pentesting de 0 a 100
🔥 Haking Web
🔥 Haking de Redes
🔥 Cybersecurity
🔥 Haging con Kali de 0 a 100
🔥 PowerShell
🔥 Nmap
🔥 Metasploit
🔥 TryHackMe Guía Completa!
🔥 Hacking…
account_circle
LawrenceNg(@LawrenceNg119) 's Twitter Profile Photo

2 - Metasploit:

Metasploit is a penetration testing framework that makes hacking simple. It’s used to validate vulnerabilities and improve security awareness. Think of it as a Swiss Army knife for cybersecurity.

account_circle
Vasileiadis A. (Cyberkid)(@Anastasis_King) 's Twitter Profile Photo

🛠️Best Hacking Tools by Category

🔰 Exploitation
1-Metasploit
2-Sqlmap
3-Core Imact
4-W3af
5-BeEF
6-Dradis

🔰 Phone_Hacking
1-Metasploit
2-Apktool
3-Droidjack
4-AndroRAT
5-Spynote

🔰 Server_Hacking
1-SQLmap
2-Jsql
3-Havij
4-Hydra
5-Metasploit
6-Armitage
7-Brupsuite
8-Owasp-ZAP…

🛠️Best Hacking Tools by Category

🔰 Exploitation
1-Metasploit
2-Sqlmap
3-Core Imact
4-W3af
5-BeEF
6-Dradis

🔰 Phone_Hacking
1-Metasploit
2-Apktool
3-Droidjack
4-AndroRAT
5-Spynote

🔰 Server_Hacking
1-SQLmap
2-Jsql
3-Havij
4-Hydra
5-Metasploit
6-Armitage
7-Brupsuite
8-Owasp-ZAP…
account_circle
WatchingRac(@RacWatchin8872) 's Twitter Profile Photo


80.99.39.40:4587 - service banner - c2d2aed9630d8685463b3aeb75a503452d96cbe4787394af9b6c9be6c32ba1ab - msf-shell

AV Detections: 2/62 (by AVAST and AVG)
Malwarebytes Can you scan the file to check if it is really malicious?
It's odd having only 2 hits on VT.

#metasploit #shell
80.99.39.40:4587 - service banner - c2d2aed9630d8685463b3aeb75a503452d96cbe4787394af9b6c9be6c32ba1ab - msf-shell

AV Detections: 2/62 (by AVAST and AVG)
@Malwarebytes Can you scan the file to check if it is really malicious?
It's odd having only 2 hits on VT.
account_circle
Karol Paciorek(@karol_paciorek) 's Twitter Profile Photo

: 144.76.219[.54:8081

:
s_8000.hta - tria.ge/240213-mapfesf…
raw_stageless_8000.hta - tria.ge/240213-mgymnsf…

C2: 144.76.219[.54:8000

#opendir: 144.76.219[.54:8081

#Metasploit: 
s_8000.hta - tria.ge/240213-mapfesf…
raw_stageless_8000.hta - tria.ge/240213-mgymnsf…

C2: 144.76.219[.54:8000

#malware
account_circle
Fakhr(@iamfakhrealam) 's Twitter Profile Photo

Step 4: Hands-on Skills

- Familiarity with common Virtualization Technologies (VMWare, Virtual Box...)
- Capture the Flag competitions: HackTheBox, TryHackMe, picoCTF, VulnHub...
- Mastery of tools like Nmap, BurpSuite, Wireshark, Metasploit, WHOIS, urlscan...

Step 4: Hands-on Skills

- Familiarity with common Virtualization Technologies (VMWare, Virtual Box...)
- Capture the Flag competitions: HackTheBox, TryHackMe, picoCTF, VulnHub...
- Mastery of tools like Nmap, BurpSuite, Wireshark, Metasploit, WHOIS, urlscan...
account_circle