Skip to content

Stuff With Aurum

Where I do stuff

  • About

Category: Uncategorized


Creating an AWS Sandbox

Posted on May 5, 2020 Updated on July 10, 2020

This article goes over the process of creating an AWS Sandbox account. The primary goal for the sandbox is to… Read more

Share this:

  • Twitter
  • Facebook
  • LinkedIn
  • Reddit
  • More
  • Print
  • Tumblr
  • Pinterest
  • Pocket
  • Telegram
  • WhatsApp
  • Email

Like this:

Like Loading...
Tags: aws, ec2, iam, s3, sandbox     Leave a comment     


Metasploitable 3 (Linux) Walkthrough: An Exploitation Guide

Posted on April 17, 2020 Updated on August 13, 2021

The Metasploitable virtual machine is an intentionally vulnerable image designed for testing security tools and demonstrating common vulnerabilities. Version 3… Read more

Share this:

  • Twitter
  • Facebook
  • LinkedIn
  • Reddit
  • More
  • Print
  • Tumblr
  • Pinterest
  • Pocket
  • Telegram
  • WhatsApp
  • Email

Like this:

Like Loading...
Tags: exploit, linux, Metasploit, Metasploitable, nmap     2 Comments     


An Innovative Phishing Style

Posted on September 30, 2018 Updated on June 15, 2020

A few weeks ago, I added one of the many scammers trying to phish people on Steam. Usually, I block… Read more

Share this:

  • Twitter
  • Facebook
  • LinkedIn
  • Reddit
  • More
  • Print
  • Tumblr
  • Pinterest
  • Pocket
  • Telegram
  • WhatsApp
  • Email

Like this:

Like Loading...
21 Comments     


Linux (x86) Exploit Development Series

Posted on July 17, 2015

Amazing tutorials for linux exploit development!

Share this:

  • Twitter
  • Facebook
  • LinkedIn
  • Reddit
  • More
  • Print
  • Tumblr
  • Pinterest
  • Pocket
  • Telegram
  • WhatsApp
  • Email

Like this:

Like Loading...
Leave a comment     


Exploit Development: Stack Buffer Overflow – Bypass NX/DEP

Posted on June 24, 2015

In my previous blog post, I covered the development of a buffer overflow exploit for a simple vulnerable program with overflow… Read more

Share this:

  • Twitter
  • Facebook
  • LinkedIn
  • Reddit
  • More
  • Print
  • Tumblr
  • Pinterest
  • Pocket
  • Telegram
  • WhatsApp
  • Email

Like this:

Like Loading...
Tags: buffer overflow, dep, gdb, Kali Linux, nx, ret2libc, rop     3 Comments     


Exploit Development: Stack Buffer Overflow

Posted on June 22, 2015

A stack buffer overflow occurs when a program writes more data to the stack than what is allocated to the… Read more

Share this:

  • Twitter
  • Facebook
  • LinkedIn
  • Reddit
  • More
  • Print
  • Tumblr
  • Pinterest
  • Pocket
  • Telegram
  • WhatsApp
  • Email

Like this:

Like Loading...
Tags: buffer overflow, edb, Kali Linux, linux     6 Comments     


Metasploitable 2 Walkthrough: An Exploitation Guide

Posted on June 14, 2015

Metasploitable 2 The Metasploitable virtual machine is an intentionally vulnerable version of Ubuntu Linux designed for testing security tools and… Read more

Share this:

  • Twitter
  • Facebook
  • LinkedIn
  • Reddit
  • More
  • Print
  • Tumblr
  • Pinterest
  • Pocket
  • Telegram
  • WhatsApp
  • Email

Like this:

Like Loading...
Tags: Kali Linux, Metasploit, Metasploitable 2, Offensive Security, Penetration Testing, Vulnhub     3 Comments     


Metasploitable Walkthrough: An Exploitation Guide

Posted on June 13, 2015

Metasploitable Metasploitable is an Ubuntu 8.04 server install on a VMWare 6.5 image with a number of vulnerable packages included,… Read more

Share this:

  • Twitter
  • Facebook
  • LinkedIn
  • Reddit
  • More
  • Print
  • Tumblr
  • Pinterest
  • Pocket
  • Telegram
  • WhatsApp
  • Email

Like this:

Like Loading...
Tags: dirb, hashcat, hydra, Kali Linux, Metasploit, Metasploitable, nmap, Offensive Security, Penetration Testing, Vulnhub     3 Comments     


Penetration Testing with Kali Linux and the OSCP

Posted on March 18, 2015

Offensive Security, PWK and OSCP – A Review PWK and OSCP Penetration Testing with Kali Linux (PWK) is Offensive Security’s starter… Read more

Share this:

  • Twitter
  • Facebook
  • LinkedIn
  • Reddit
  • More
  • Print
  • Tumblr
  • Pinterest
  • Pocket
  • Telegram
  • WhatsApp
  • Email

Like this:

Like Loading...
Tags: Kali Linux, Offensive Security, OSCP, Penetration Testing, PWK     2 Comments     


Recent Posts

  • Creating an AWS Sandbox
  • Metasploitable 3 (Linux) Walkthrough: An Exploitation Guide
  • An Innovative Phishing Style
  • Linux (x86) Exploit Development Series
  • Exploit Development: Stack Buffer Overflow – Bypass NX/DEP

Recent Comments

  • 靶场练习 - Metaploitable1 - 清风. on Metasploitable Walkthrough: An Exploitation Guide
  • IS on Exploit Development: Stack Buffer Overflow – Bypass NX/DEP
  • Harjoitus 5 – Justuksen Blog on Metasploitable 3 (Linux) Walkthrough: An Exploitation Guide
  • Rikky on Metasploitable 3 (Linux) Walkthrough: An Exploitation Guide
  • Metasploitable 3 (Linux): An Exploitation Guide – Stuff With Aurum on Metasploitable 2 Walkthrough: An Exploitation Guide
BlogBD WordPress Theme
%d