Skip to content

Stuff With Aurum

Where I do stuff

  • About

Tag: Penetration Testing


Metasploitable 2 Walkthrough: An Exploitation Guide

Posted on June 14, 2015

Metasploitable 2 The Metasploitable virtual machine is an intentionally vulnerable version of Ubuntu Linux designed for testing security tools and… Read more

Share this:

  • Twitter
  • Facebook
  • LinkedIn
  • Reddit
  • More
  • Print
  • Tumblr
  • Pinterest
  • Pocket
  • Telegram
  • WhatsApp
  • Email

Like this:

Like Loading...
Tags: Kali Linux, Metasploit, Metasploitable 2, Offensive Security, Penetration Testing, Vulnhub     3 Comments     


Metasploitable Walkthrough: An Exploitation Guide

Posted on June 13, 2015

Metasploitable Metasploitable is an Ubuntu 8.04 server install on a VMWare 6.5 image with a number of vulnerable packages included,… Read more

Share this:

  • Twitter
  • Facebook
  • LinkedIn
  • Reddit
  • More
  • Print
  • Tumblr
  • Pinterest
  • Pocket
  • Telegram
  • WhatsApp
  • Email

Like this:

Like Loading...
Tags: dirb, hashcat, hydra, Kali Linux, Metasploit, Metasploitable, nmap, Offensive Security, Penetration Testing, Vulnhub     3 Comments     


Penetration Testing with Kali Linux and the OSCP

Posted on March 18, 2015

Offensive Security, PWK and OSCP – A Review PWK and OSCP Penetration Testing with Kali Linux (PWK) is Offensive Security’s starter… Read more

Share this:

  • Twitter
  • Facebook
  • LinkedIn
  • Reddit
  • More
  • Print
  • Tumblr
  • Pinterest
  • Pocket
  • Telegram
  • WhatsApp
  • Email

Like this:

Like Loading...
Tags: Kali Linux, Offensive Security, OSCP, Penetration Testing, PWK     2 Comments     


Recent Posts

  • Creating an AWS Sandbox
  • Metasploitable 3 (Linux) Walkthrough: An Exploitation Guide
  • An Innovative Phishing Style
  • Linux (x86) Exploit Development Series
  • Exploit Development: Stack Buffer Overflow – Bypass NX/DEP

Recent Comments

  • 靶场练习 - Metaploitable1 - 清风. on Metasploitable Walkthrough: An Exploitation Guide
  • IS on Exploit Development: Stack Buffer Overflow – Bypass NX/DEP
  • Harjoitus 5 – Justuksen Blog on Metasploitable 3 (Linux) Walkthrough: An Exploitation Guide
  • Rikky on Metasploitable 3 (Linux) Walkthrough: An Exploitation Guide
  • Metasploitable 3 (Linux): An Exploitation Guide – Stuff With Aurum on Metasploitable 2 Walkthrough: An Exploitation Guide
BlogBD WordPress Theme
%d