Featured Posts

Most selected posts are waiting for you. Check this out

The Metasploit - Heart Of Hacking

The Metasploit - Heart Of Hacking



The Metasploit Project is a computer security project that provides information about security vulnerabilities and aids in penetration testing and IDS signature development. It is owned by Boston, Massachusetts-based security company Rapid7.
Its best-known sub-project is the open-source[2] Metasploit Framework, a tool for developing and executing exploit code against a remote target machine. Other important sub-projects include the Opcode Database, shellcode archive and related research.
The Metasploit Project includes anti-forensic and evasion tools, some of which are built into the Metasploit Framework. Metasploit is pre-installed in the Kali Linux operating system.[3]

Metasploit was created by H. D. Moore in 2003 as a portable network tool using Perl. By 2007, the Metasploit Framework had been completely rewritten in Ruby.[4] On October 21, 2009, the Metasploit Project announced[5] that it had been acquired by Rapid7, a security company that provides unified vulnerability management solutions.
Like comparable commercial products such as Immunity's Canvas or Core Security TechnologiesCore Impact, Metasploit can be used to test the vulnerability of computer systems or to break into remote systems. Like many information security tools, Metasploit can be used for both legitimate and unauthorized activities. Since the acquisition of the Metasploit Framework, Rapid7 has added two open core proprietary editions called Metasploit Express and Metasploit Pro.
Metasploit's emerging position as the de facto exploit development framework[6] led to the release of software vulnerability advisories often accompanied[7] by a third party Metasploit exploit module that highlights the exploitability, risk and remediation of that particular bug.[8][9] Metasploit 3.0 began to include fuzzing tools, used to discover software vulnerabilities, rather than just exploits for known bugs. This avenue can be seen with the integration of the lorcon wireless (802.11) toolset into Metasploit 3.0 in November 2006. Metasploit 4.0 was released in August 2011.
What is Hacking?

What is Hacking?


Hackers employ a variety of techniques for hacking, including:
  • Vulnerability scanner: checks computers on networks for known weaknesses
  • Password cracking: the process of recovering passwords from data stored or transmitted by computer systems
  • Packet sniffer: applications that capture data packets in order to view data and passwords in transit over networks
  • Spoofing attack: involves websites which falsify data by mimicking legitimate sites, and they are therefore treated as trusted sites by users or other programs
  • Root kit: represents a set of programs which work to subvert control of an operating system from legitimate operators
  • Trojan horse: serves as a back door in a computer system to allow an intruder to gain access to the system later
  • Viruses: self-replicating programs that spread by inserting copies of themselves into other executable code files or documents
  • Key loggers: tools designed to record every keystroke on the affected machine for later retrieval