Tag: Uncategorized


[Metasploit Pro] Client-side exploitation

This write-up shows how you can get up & running with client-side / phishing assessment using Metasploit Pro 4.0.

Let’s start by creating a new project. …


Botnets: The Silent Threat – Part II

Protocols used by Botnet
+ IRC (Most prevalent)
+ HTTP (Increasingly prevalent)
+ P2P
+ IM (Instant Messenger)

Categories of Botnets

+ Centralized CnC
In Centralized CnC model, …