Skip to main content

Posts

Showing posts from June, 2013

How To Install BT 5 R3 On Virtual Machine Step By Step !

In this tutorial i will show you how to install  Backtrack 5 R3  which is recently  released by offensive security team . if you’ve previously installed backtrack then you might be familiar with  backtrack installations   . its easy and simple just follow given simple steps. Stage 1  Requirements 1 : Download backtrack ISO from  here 2 :  Download  VMware Workstation  or   VMplayer 3 : Install any of above Stage 2 Installation 1 : Create A new virtual machine 2 : choose installer ISO ( choose backtrack 5 ISO )  3 : choose   Linux  as your guest operating system type and  Ubuntu   as version 4 : give a name and location of your backtrack VM 5 : Specify virtual hard drive space ( 20 GB is good enough ) then click finish from ready to create vm window hit enter to go boot screen then choose   d...

How To Use Metasploit Explained With Exmaple

--- The Metasploit Framework --- Note : This is an advance topic.Read Carefully. Feel free to ask any kind of queries . We are always here to help you. If you are really interested in network security, chances are you must have heard of the Metasploit over the last few years. Now, have you ever wondered what someone can do to your PC, by just knowing your IP. Here's the answer. He could 0wN you, or in other words , he could have full access to your PC provided you hav e just a few security loopholes which may arise cause of even a simple reason like not updating your Flash player last week, when it prompted you to do so. Metasploit is a hacker's best friend, mainly cause it makes the job of exploitation and post-exploitation a lot easier compared to other traditional methods of hacking. The topic Metasploit is very vast in itself.However, i'll try keeping it basic and simple so that it could be understood by everyone here. Also, Metasp loit can be used w...