This video demonstrates the ease with which an attacker can create a root shell on a Linux machine using a backdoor Trojan and a Metasploit payload. Via SecurityTube. This video demonstrates the ease ...
Your boss calls you into her office. You stare at the fake mahogany panels that line her wall. She strikes a match and asks, “Did you see the news? Criminals broke into our competitor's network.
The penetration testing world saw a couple of exciting announcements yesterday. The first one I want to mention because it's one of my favorite tools -- Burp Suite Professional. It's a great tool for ...
Metasploit Pro version 4.0 has been launched by Rapid7. The new Metasploit Pro version claims to add support for integration into security information and event management (SIEM) systems, facilitates ...