Referenced link: https://www.rapid7.com/blog/post/2023/05/25/fetch-payloads-a-shorter-path-from-command-injection-to-metasploit-session/
Originally posted by Metasploit Project / @metasploit@twitter.com: https://twitter.com/metasploit/status/1661778113125138433#m
Introducing fetch payloads in #Metasploit: Two-thirds of exploits added to MSF the past year have targeted command injection vulns. A new payload type from @tychos_moose simplifies command injection module development and offers an on-the-fly hacking tool🧵https://www.rapid7.com/blog/post/2023/05/25/fetch-payloads-a-shorter-path-from-command-injection-to-metasploit-session/
Originally posted by Metasploit Project / @metasploit@twitter.com: https://twitter.com/catc0n/status/1620063922270384131#m
RT by @metasploit: Bananas fantastic work from the #Metasploit team here adding killer new features and simplifying complex attack workflows that are relevant to a huge percentage of modern environments
Referenced link: https://www.rapid7.com/blog/post/2022/12/30/2022-metasploit-wrap-up/
Originally posted by Metasploit Project / @metasploit@twitter.com: https://twitter.com/metasploit/status/1608855324034994176#m
2022 #Metasploit wrap-up out now c/o @zeroSteiner. Highlights: Support for AD CS attacks, Linux credential extraction, user-contributable docs, a new getsystem technique, Meterpreter interoperability with Cobalt Strike beacons + Sliver agents, and more. https://www.rapid7.com/blog/post/2022/12/30/2022-metasploit-wrap-up/
Referenced link: https://www.rapid7.com/blog/post/2022/12/09/metasploit-wrap-up-156/
Originally posted by Metasploit Project / @metasploit@twitter.com: https://twitter.com/metasploit/status/1601317509063667712#m
New in #Metasploit this week: A WordPress exploit, a vCenter privilege escalation, and a login scanner for Syncovery, plus #ProxyShell improvements and more https://www.rapid7.com/blog/post/2022/12/09/metasploit-wrap-up-156/
Originally posted by Metasploit Project / @metasploit@twitter.com: https://twitter.com/autumnwhisperz/status/1601276680357961728#m
RT by @metasploit: Just completed Day 9 of the Advent of Cyber 2022. It wasn’t easy, and there was a lot to get into! #tryhackme #infosec #kali #Linux #metasploit #meterpreter
#tryhackme #infosec #kali #linux #Metasploit #meterpreter
Referenced link: https://hackernoon.com/attack-default-ssh-usernamepasswords-using-metasploit
Discuss on https://discu.eu/q/https://hackernoon.com/attack-default-ssh-usernamepasswords-using-metasploit
Originally posted by HackerNoon | Learn Any Technology / @hackernoon@twitter.com: https://twitter.com/hackernoon/status/1545180900920631296#m
"Attack Default SSH Username/Passwords Using Metasploit" https://hackernoon.com/attack-default-ssh-usernamepasswords-using-metasploit #cybersecurity #metasploit