Skip to main content

March 16, 2015

Create a Budget-Friendly Virtual Private Server with a Metasploit Instance

Whether a requirement for anonymity arises during a penetration test or simply to stand up another Metasploit instance, we can do so easily with VPS p...

See Details

November 24, 2014

War Dialing Part 3: Modem Interaction

At this point, and likely sooner, we need to get our lab environment set up with all the necessary dialing gear. In previous sections, we identified t...

See Details

November 10, 2014

War Dialing Part 1: The VoIP and Analog Primer

In this series of posts, I will introduce the concept of telephony war dialing along with techniques to perform such assessments. Initially, we need t...

See Details

September 16, 2014

Phishing with Smitty: A Unique Tool for Solicitation Attacks

This post will introduce you to the Smitty SMTP utility, which is a fully featured email client. We use this tool as a means to effectively deliver em...

See Details

February 06, 2012

Winning With VBA Macros

As pen-testers, it is often that we come across obstacles; the technical adversaries that keep us from getting our prize in the cracker jack box. This...

See Details