#metasploit 搜尋結果

💥 Metasploit — Comprehensive Guide: Framework, Workflows & Safe Use ☣️ A compact overview of Metasploit’s core components (msfconsole, msfvenom, modules, and Meterpreter), common workflows for authorized validation, and how to document findings responsibly. #Metasploit

Anastasis_King's tweet image. 💥 Metasploit — Comprehensive Guide: Framework, Workflows & Safe Use ☣️

A compact overview of Metasploit’s core components (msfconsole, msfvenom, modules, and Meterpreter), common workflows for authorized validation, and how to document findings responsibly.

#Metasploit
Anastasis_King's tweet image. 💥 Metasploit — Comprehensive Guide: Framework, Workflows & Safe Use ☣️

A compact overview of Metasploit’s core components (msfconsole, msfvenom, modules, and Meterpreter), common workflows for authorized validation, and how to document findings responsibly.

#Metasploit
Anastasis_King's tweet image. 💥 Metasploit — Comprehensive Guide: Framework, Workflows & Safe Use ☣️

A compact overview of Metasploit’s core components (msfconsole, msfvenom, modules, and Meterpreter), common workflows for authorized validation, and how to document findings responsibly.

#Metasploit
Anastasis_King's tweet image. 💥 Metasploit — Comprehensive Guide: Framework, Workflows & Safe Use ☣️

A compact overview of Metasploit’s core components (msfconsole, msfvenom, modules, and Meterpreter), common workflows for authorized validation, and how to document findings responsibly.

#Metasploit

#Metasploit #Malware 💣89.197.154.116💣 Files: Excel.exe - Meterpreter Shell Macro.vbs - Creates and Executes an Exe named uWeBbVRuMcAR.exe (connects to C2) Monitor.exe - Marte Beacon C2:89.197.154.116:7810 app.any.run/tasks/c2eebee7… tria.ge/240908-q53hba1… virustotal.com/gui/file/5e436…

RacWatchin8872's tweet image. #Metasploit #Malware
💣89.197.154.116💣
Files:
Excel.exe - Meterpreter Shell
Macro.vbs - Creates and Executes an Exe named uWeBbVRuMcAR.exe (connects to C2)
Monitor.exe - Marte Beacon

C2:89.197.154.116:7810
app.any.run/tasks/c2eebee7…
tria.ge/240908-q53hba1…
virustotal.com/gui/file/5e436…
RacWatchin8872's tweet image. #Metasploit #Malware
💣89.197.154.116💣
Files:
Excel.exe - Meterpreter Shell
Macro.vbs - Creates and Executes an Exe named uWeBbVRuMcAR.exe (connects to C2)
Monitor.exe - Marte Beacon

C2:89.197.154.116:7810
app.any.run/tasks/c2eebee7…
tria.ge/240908-q53hba1…
virustotal.com/gui/file/5e436…
RacWatchin8872's tweet image. #Metasploit #Malware
💣89.197.154.116💣
Files:
Excel.exe - Meterpreter Shell
Macro.vbs - Creates and Executes an Exe named uWeBbVRuMcAR.exe (connects to C2)
Monitor.exe - Marte Beacon

C2:89.197.154.116:7810
app.any.run/tasks/c2eebee7…
tria.ge/240908-q53hba1…
virustotal.com/gui/file/5e436…

24664a5adc23a7df4e6f55e81ca25977d9ef469b066ac39d53a845ea6a4481e7 193[.]161[.]193[.]99:29675 #Metasploit

skocherhan's tweet image. 24664a5adc23a7df4e6f55e81ca25977d9ef469b066ac39d53a845ea6a4481e7
193[.]161[.]193[.]99:29675
#Metasploit

#Malware #Backdoor #Metasploit 💣123.60.104.67:9999💣 - 1722937766.elf - Metasploit C2: 36.138.146.107:8554 - 浙江迪艾智控科技股份有限公司-薪资表.exe - Metasploit C2: hxxp://123.60.104.67:32132/EoDd virustotal.com/gui/file/f5865… virustotal.com/gui/file/a33f2…

RacWatchin8872's tweet image. #Malware #Backdoor #Metasploit
💣123.60.104.67:9999💣
- 1722937766.elf - Metasploit C2: 36.138.146.107:8554
- 浙江迪艾智控科技股份有限公司-薪资表.exe - Metasploit C2: hxxp://123.60.104.67:32132/EoDd

virustotal.com/gui/file/f5865…
virustotal.com/gui/file/a33f2…
RacWatchin8872's tweet image. #Malware #Backdoor #Metasploit
💣123.60.104.67:9999💣
- 1722937766.elf - Metasploit C2: 36.138.146.107:8554
- 浙江迪艾智控科技股份有限公司-薪资表.exe - Metasploit C2: hxxp://123.60.104.67:32132/EoDd

virustotal.com/gui/file/f5865…
virustotal.com/gui/file/a33f2…
RacWatchin8872's tweet image. #Malware #Backdoor #Metasploit
💣123.60.104.67:9999💣
- 1722937766.elf - Metasploit C2: 36.138.146.107:8554
- 浙江迪艾智控科技股份有限公司-薪资表.exe - Metasploit C2: hxxp://123.60.104.67:32132/EoDd

virustotal.com/gui/file/f5865…
virustotal.com/gui/file/a33f2…
RacWatchin8872's tweet image. #Malware #Backdoor #Metasploit
💣123.60.104.67:9999💣
- 1722937766.elf - Metasploit C2: 36.138.146.107:8554
- 浙江迪艾智控科技股份有限公司-薪资表.exe - Metasploit C2: hxxp://123.60.104.67:32132/EoDd

virustotal.com/gui/file/f5865…
virustotal.com/gui/file/a33f2…

Echo “ Hello 🙋‍♂️ “ > KU.text #metasploit

HF_AL3NZE's tweet image. Echo  “ Hello 🙋‍♂️ “  > KU.text 

#metasploit
HF_AL3NZE's tweet image. Echo  “ Hello 🙋‍♂️ “  > KU.text 

#metasploit
HF_AL3NZE's tweet image. Echo  “ Hello 🙋‍♂️ “  > KU.text 

#metasploit

#opendir #metasploit 💣89.197.154.116💣 Files: - Mile.exe - C2: 89.197.154.116:7810 - Trial.exe - C2: 89.197.154.116:7810 virustotal.com/gui/file/19970… virustotal.com/gui/file/4246f…

RacWatchin8872's tweet image. #opendir #metasploit
💣89.197.154.116💣
Files:
- Mile.exe - C2: 89.197.154.116:7810
- Trial.exe - C2: 89.197.154.116:7810
virustotal.com/gui/file/19970…
virustotal.com/gui/file/4246f…

🚨 #OpenDir: 178.61.171[.67 🦠 #Metasploit [Shikata Ga Nai]: neq32.exe 💡 Shikata Ga Nai (SGN), meaning “nothing can be done about it,” is an evasion tool used for hiding payloads. It helps make malicious code harder to detect 🛡️. 🎯 C2: 178.61.171[.67:1336

karol_paciorek's tweet image. 🚨 #OpenDir: 178.61.171[.67

🦠 #Metasploit [Shikata Ga Nai]: neq32.exe

💡 Shikata Ga Nai (SGN), meaning “nothing can be done about it,” is an evasion tool used for hiding payloads. It helps make malicious code harder to detect 🛡️. 

🎯 C2: 178.61.171[.67:1336

#الامن_السيبراني 🛡️ كيف يتم استغلال البورتات المفتوحة باستخدام #Metasploit 🧑🏻‍💻.. يجب أن تكون على معرفة بأساسيات الأمان السيبراني، بالإضافة إلى معرفة كيفية استخدام الأدوات بشكل فعال، سأقوم بشرح الخطوات الأساسية لذلك مع مثال عملي 🔥.. تابع 👇🏻

GREENARM0R's tweet image. #الامن_السيبراني

🛡️ كيف يتم استغلال البورتات المفتوحة باستخدام #Metasploit 🧑🏻‍💻..

يجب أن تكون على معرفة بأساسيات الأمان السيبراني، بالإضافة إلى معرفة كيفية استخدام الأدوات بشكل فعال، سأقوم بشرح الخطوات الأساسية لذلك مع مثال عملي 🔥..

تابع 👇🏻

Meterpreter Found 192[.]64[.]83[.]210/service[.]exe 02263f1bd15e4364a463117bb79c7d7e7e8a75da47006b74ba4c976b34e15c5e C2: 192[.]64[.]83[.]210:7890 AS19318 IS-AS-1 🇺🇸 #Metasploit @500mk500 @abuse_ch

skocherhan's tweet image. Meterpreter Found 
192[.]64[.]83[.]210/service[.]exe
02263f1bd15e4364a463117bb79c7d7e7e8a75da47006b74ba4c976b34e15c5e

C2: 192[.]64[.]83[.]210:7890
AS19318 IS-AS-1 🇺🇸
#Metasploit @500mk500 @abuse_ch

Top Metasploit Commands 🚀 Here is your essential cheat sheet for the most common Metasploit commands, from searching exploits to gaining access. ⭐️ Save this post for your next penetration test! 👇 What's your most-used command? Share it below! #metasploit #cybersecurity

hackviserr's tweet image. Top Metasploit Commands 🚀

Here is your essential cheat sheet for the most common Metasploit commands, from searching exploits to gaining access.

⭐️ Save this post for your next penetration test!
👇 What's your most-used command? Share it below!

#metasploit #cybersecurity…

Successfully bypassed VNC login using Metasploit — now I've got root access. 🛠️💻 #Pentest #Metasploit #EthicalHacking

Segun034z's tweet image. Successfully bypassed VNC login using Metasploit — now I've got root access. 🛠️💻 #Pentest #Metasploit #EthicalHacking

#الأمن_السيبراني 🛡️ من الاختراق إلى السيطرة، كشف أسرار وحدات ما بعد الاستغلال المتقدمة في Metasploit 💣☢️.. 🛡️ ما هي وحدات ما بعد الاستغلال (Post-Exploitation Modules)؟ ☠️ هي مكونات برمجية (أدوات أو سكربتات) مدمجة في إطار عمل #Metasploit ،،، تابع 👇🏻

GREENARM0R's tweet image. #الأمن_السيبراني

🛡️ من الاختراق إلى السيطرة، كشف أسرار وحدات ما بعد الاستغلال المتقدمة في Metasploit 💣☢️..

🛡️ ما هي وحدات ما بعد الاستغلال (Post-Exploitation Modules)؟ ☠️

هي مكونات برمجية (أدوات أو سكربتات) مدمجة في إطار عمل #Metasploit ،،، تابع 👇🏻

1c7785950f603e370493a7490531ef27 #Metasploit

skocherhan's tweet image. 1c7785950f603e370493a7490531ef27
#Metasploit

🧠 Metasploit – Automate Security Testing Like a Pro 🛡️ Metasploit is one of the most advanced and widely used cybersecurity frameworks for testing and strengthening system defenses. #CyberSecurity #Metasploit #EthicalTesting #SecurityFramework #VulnerabilityAssessment

Anastasis_King's tweet image. 🧠 Metasploit – Automate Security Testing Like a Pro 🛡️

Metasploit is one of the most advanced and widely used cybersecurity frameworks for testing and strengthening system defenses. 

#CyberSecurity #Metasploit #EthicalTesting #SecurityFramework #VulnerabilityAssessment
Anastasis_King's tweet image. 🧠 Metasploit – Automate Security Testing Like a Pro 🛡️

Metasploit is one of the most advanced and widely used cybersecurity frameworks for testing and strengthening system defenses. 

#CyberSecurity #Metasploit #EthicalTesting #SecurityFramework #VulnerabilityAssessment
Anastasis_King's tweet image. 🧠 Metasploit – Automate Security Testing Like a Pro 🛡️

Metasploit is one of the most advanced and widely used cybersecurity frameworks for testing and strengthening system defenses. 

#CyberSecurity #Metasploit #EthicalTesting #SecurityFramework #VulnerabilityAssessment
Anastasis_King's tweet image. 🧠 Metasploit – Automate Security Testing Like a Pro 🛡️

Metasploit is one of the most advanced and widely used cybersecurity frameworks for testing and strengthening system defenses. 

#CyberSecurity #Metasploit #EthicalTesting #SecurityFramework #VulnerabilityAssessment

YouTube動画アップ‼️ 今回は #Metasploit を解説😎 @ipusiron さんの書籍「💀ハッキング・ラボのつくりかた完全版」でも使われるツール💀 【遠隔操作の恐怖...】Metasploitとは? まるでハッ〇ーになった気分😎 youtu.be/sW1WHb5aZ1w #ハッキングラボ

yukuri_it's tweet image. YouTube動画アップ‼️

今回は #Metasploit を解説😎
@ipusiron さんの書籍「💀ハッキング・ラボのつくりかた完全版」でも使われるツール💀

【遠隔操作の恐怖...】Metasploitとは? まるでハッ〇ーになった気分😎
youtu.be/sW1WHb5aZ1w

#ハッキングラボ

How skilled are you in cybersecurity? Serious learners will get this one right. Comment the answer below. Then, keep the momentum going with 25+ free cybersecurity courses. Create your free no-obligation CodeRed account today #CyberSecurity #EthicalHacking #Metasploit

CodeRed_Pro's tweet image. How skilled are you in cybersecurity? Serious learners will get this one right. Comment the answer below.

Then, keep the momentum going with 25+ free cybersecurity courses. 

Create your free no-obligation 
CodeRed account today

#CyberSecurity #EthicalHacking #Metasploit…
CodeRed_Pro's tweet image. How skilled are you in cybersecurity? Serious learners will get this one right. Comment the answer below.

Then, keep the momentum going with 25+ free cybersecurity courses. 

Create your free no-obligation 
CodeRed account today

#CyberSecurity #EthicalHacking #Metasploit…

'dbghelp.dll' #metasploit seen from Virgin Islands @abuse_ch bazaar.abuse.ch/sample/f568efd… Domain: is25(.)in

smica83's tweet image. 'dbghelp.dll' #metasploit seen from Virgin Islands @abuse_ch 
bazaar.abuse.ch/sample/f568efd… 
Domain: is25(.)in

🧠 Metasploit – Automate Security Testing Like a Pro 🛡️ Metasploit is one of the most advanced and widely used cybersecurity frameworks for testing and strengthening system defenses. #CyberSecurity #Metasploit #EthicalTesting #SecurityFramework #VulnerabilityAssessment

Anastasis_King's tweet image. 🧠 Metasploit – Automate Security Testing Like a Pro 🛡️

Metasploit is one of the most advanced and widely used cybersecurity frameworks for testing and strengthening system defenses. 

#CyberSecurity #Metasploit #EthicalTesting #SecurityFramework #VulnerabilityAssessment
Anastasis_King's tweet image. 🧠 Metasploit – Automate Security Testing Like a Pro 🛡️

Metasploit is one of the most advanced and widely used cybersecurity frameworks for testing and strengthening system defenses. 

#CyberSecurity #Metasploit #EthicalTesting #SecurityFramework #VulnerabilityAssessment
Anastasis_King's tweet image. 🧠 Metasploit – Automate Security Testing Like a Pro 🛡️

Metasploit is one of the most advanced and widely used cybersecurity frameworks for testing and strengthening system defenses. 

#CyberSecurity #Metasploit #EthicalTesting #SecurityFramework #VulnerabilityAssessment
Anastasis_King's tweet image. 🧠 Metasploit – Automate Security Testing Like a Pro 🛡️

Metasploit is one of the most advanced and widely used cybersecurity frameworks for testing and strengthening system defenses. 

#CyberSecurity #Metasploit #EthicalTesting #SecurityFramework #VulnerabilityAssessment

In cybersecurity, skill doesn’t make you great — ethics do. 🔒 Anyone can use Metasploit. The real professional knows where to draw the line. #CyberSecurity #EthicalHacking #Metasploit #CyberEthics

mohammed_badmus's tweet image. In cybersecurity, skill doesn’t make you great —
ethics do. 🔒

Anyone can use Metasploit.
The real professional knows where to draw the line.

#CyberSecurity #EthicalHacking #Metasploit #CyberEthics

Behind every exploit is a lesson. 🧠 Tools like Metasploit don’t just expose vulnerabilities — they help us understand how attackers think. Ethical hacking isn’t about breaking — it’s about learning to defend. 💪 #Metasploit #CyberSecurity #EthicalHacking #PenTesting

mohammed_badmus's tweet image. Behind every exploit is a lesson. 🧠

Tools like Metasploit don’t just expose vulnerabilities —
they help us understand how attackers think.

Ethical hacking isn’t about breaking — it’s about learning to defend. 💪

#Metasploit #CyberSecurity #EthicalHacking #PenTesting

Metasploit gives hackers power — but ethical hackers use it with responsibility. ⚡ I’m working on a short demo that shows how it’s used to test systems safely. What would you want to see first — exploits, payloads, or defense? 👇 #Metasploit #CyberSecurity #EthicalHacking

mohammed_badmus's tweet image. Metasploit gives hackers power —
but ethical hackers use it with responsibility. ⚡

I’m working on a short demo that shows how it’s used to test systems safely.

What would you want to see first — exploits, payloads, or defense? 👇

#Metasploit #CyberSecurity #EthicalHacking

Ratheesh will be delivering a vital session on the Metasploit Framework at Secusphere 2025. This is a must for anyone serious about ethical hacking. Grab your virtual seat! 👉 zurl.co/PDa13 #Metasploit #PenTesting #EthicalHacking #Secusphere2025 #CyberSecurity

edwherelearning's tweet image. Ratheesh will be delivering a vital session on the Metasploit Framework at Secusphere 2025. This is a must for anyone serious about ethical hacking.

Grab your virtual seat! 👉 zurl.co/PDa13

#Metasploit #PenTesting #EthicalHacking #Secusphere2025 #CyberSecurity

💭 If I make a Metasploit demo, which would you prefer? 🔹 Setting up & running an exploit 🔹 Defending against a simulated attack Comment below 👇 #Metasploit #CyberSecurity #EthicalHacking #PenTesting

mohammed_badmus's tweet image. 💭 If I make a Metasploit demo, which would you prefer?

🔹 Setting up & running an exploit
🔹 Defending against a simulated attack

Comment below 👇

#Metasploit #CyberSecurity #EthicalHacking #PenTesting

Metasploit = the ethical tester’s toolkit. 🔧 Use it to simulate attacks, validate fixes, and test defenses — in a safe, authorized lab environment. Want a short demo? Follow for a walkthrough soon. 👇 #Metasploit #CyberSecurity #PenTesting #EthicalHacking

mohammed_badmus's tweet image. Metasploit = the ethical tester’s toolkit. 🔧

Use it to simulate attacks, validate fixes, and test defenses — in a safe, authorized lab environment.

Want a short demo? Follow for a walkthrough soon. 👇

#Metasploit #CyberSecurity #PenTesting #EthicalHacking

Secusphere 2025: Day 2 - LOCK DAY! 🔒 Hacking Tools UNLOCKED! Join Ratheesh on Oct 26th (8 PM IST) for Metasploit Framework. Learn ethical hacking basics, Kali Linux, and see Msfconsole/Msfvenom demos. Don't miss it! 🛠️ #Secusphere2025 #Metasploit #Pentesting #HackingTools

edwherelearning's tweet image. Secusphere 2025: Day 2 - LOCK DAY! 🔒
Hacking Tools UNLOCKED! Join Ratheesh on Oct 26th (8 PM IST) for Metasploit Framework.

Learn ethical hacking basics, Kali Linux, and see Msfconsole/Msfvenom demos.

Don't miss it! 🛠️

#Secusphere2025 #Metasploit #Pentesting #HackingTools

Just completed Metasploit Mastery: The Ultimate Command & Automation Handbook — and damn, this is next level. 🖤 Commands? Clean. Automation? On point. Real-world workflows? Exactly what I needed. ⚡️ Get the Pdf : resources.codelivly.com/product/metasp… #metasploit #codelivly #hacking

rocky_rowdy_'s tweet image. Just completed Metasploit Mastery: The Ultimate Command & Automation Handbook — and damn, this is next level. 🖤

Commands? Clean. Automation? On point. Real-world workflows? Exactly what I needed. ⚡️

Get the Pdf : 
resources.codelivly.com/product/metasp…

#metasploit #codelivly #hacking

Metasploit = The ethical hacker’s lab. 💻 It lets you simulate attacks, test defenses, & validate vulnerabilities safely. Learn it. Respect it. Use it ethically. 🔐 #Metasploit #CyberSecurity #EthicalHacking #PenTesting

mohammed_badmus's tweet image. Metasploit = The ethical hacker’s lab. 💻

It lets you simulate attacks, test defenses, & validate vulnerabilities safely.

Learn it. Respect it. Use it ethically. 🔐

#Metasploit #CyberSecurity #EthicalHacking #PenTesting

Top Metasploit Commands 🚀 Here is your essential cheat sheet for the most common Metasploit commands, from searching exploits to gaining access. ⭐️ Save this post for your next penetration test! 👇 What's your most-used command? Share it below! #metasploit #cybersecurity

hackviserr's tweet image. Top Metasploit Commands 🚀

Here is your essential cheat sheet for the most common Metasploit commands, from searching exploits to gaining access.

⭐️ Save this post for your next penetration test!
👇 What's your most-used command? Share it below!

#metasploit #cybersecurity…

#Metasploit in shell.exe (4e716bc8b86c56396bb0900af7a59fbaaecc68ea501164d1a0f4b259ec74a6df ) virustotal.com/gui/file/4e716…


Usare getsystem di Meterpreter per ottenere (forse) i privilegi di SYSTEM #metasploit #cybersecurity #meterpreter #reel


Pentest-Cheat-Sheets A collection of snippets of codes and commands to help our lives! The main purpose is not be a crutch, this is a way to do not waste our precious time! This repo also helps who trying to get OSCP. You'll find many ways to do something without #Metasploit

hack_git's tweet image. Pentest-Cheat-Sheets

A collection of snippets of codes and commands to help our lives! The main purpose is not be a crutch, this is a way to do not waste our precious time! This repo also helps who trying to get OSCP. You'll find many ways to do something without #Metasploit…

تعلم الميتاسبلويت من الصفر للاحتراف مقدمة عن الـ Metasploit bit.ly/3Gmc8qW للحصول على دورة كاملة لشرح الميتاسبلويت : bit.ly/3grf9vp #Metasploit #Infosec4tc

Free4arab1's tweet image. تعلم الميتاسبلويت من الصفر للاحتراف

مقدمة عن الـ Metasploit                
bit.ly/3Gmc8qW

للحصول على دورة كاملة لشرح الميتاسبلويت   : bit.ly/3grf9vp

#Metasploit #Infosec4tc

#Metasploit > C2 139.99.155.76:50010 reverse.exe > bazaar.abuse.ch/sample/935d4f8… + Friday #opendir on port 80 🔎

1ZRR4H's tweet image. #Metasploit > C2 139.99.155.76:50010
reverse.exe > bazaar.abuse.ch/sample/935d4f8…

+ Friday #opendir on port 80 🔎
1ZRR4H's tweet image. #Metasploit > C2 139.99.155.76:50010
reverse.exe > bazaar.abuse.ch/sample/935d4f8…

+ Friday #opendir on port 80 🔎

#opendir #metasploit 💣89.197.154.116💣 Files: - Mile.exe - C2: 89.197.154.116:7810 - Trial.exe - C2: 89.197.154.116:7810 virustotal.com/gui/file/19970… virustotal.com/gui/file/4246f…

RacWatchin8872's tweet image. #opendir #metasploit
💣89.197.154.116💣
Files:
- Mile.exe - C2: 89.197.154.116:7810
- Trial.exe - C2: 89.197.154.116:7810
virustotal.com/gui/file/19970…
virustotal.com/gui/file/4246f…

تعلم الميتاسبلويت من الصفر للاحتراف مقدمة عن الـ Metasploit free4arab.net/courses/networ… المحاضر : المهندس حسن سعد ولمتابعة كل كورسات المهندس حسن free4arab.net/instructor/has… خصم على دورة كاملة لشرح الميتاسبلويت bit.ly/3grf9vp #Metasploit #Infosec4tc

Free4arab1's tweet image. تعلم الميتاسبلويت من الصفر للاحتراف

مقدمة عن الـ Metasploit  
              
free4arab.net/courses/networ…

المحاضر : المهندس حسن سعد

ولمتابعة كل كورسات المهندس حسن

free4arab.net/instructor/has…

خصم على دورة كاملة لشرح الميتاسبلويت bit.ly/3grf9vp

#Metasploit #Infosec4tc

#الامن_السيبراني 🛡️ كيف يتم استغلال البورتات المفتوحة باستخدام #Metasploit 🧑🏻‍💻.. يجب أن تكون على معرفة بأساسيات الأمان السيبراني، بالإضافة إلى معرفة كيفية استخدام الأدوات بشكل فعال، سأقوم بشرح الخطوات الأساسية لذلك مع مثال عملي 🔥.. تابع 👇🏻

GREENARM0R's tweet image. #الامن_السيبراني

🛡️ كيف يتم استغلال البورتات المفتوحة باستخدام #Metasploit 🧑🏻‍💻..

يجب أن تكون على معرفة بأساسيات الأمان السيبراني، بالإضافة إلى معرفة كيفية استخدام الأدوات بشكل فعال، سأقوم بشرح الخطوات الأساسية لذلك مع مثال عملي 🔥..

تابع 👇🏻

#Malware #Backdoor #Metasploit 💣123.60.104.67:9999💣 - 1722937766.elf - Metasploit C2: 36.138.146.107:8554 - 浙江迪艾智控科技股份有限公司-薪资表.exe - Metasploit C2: hxxp://123.60.104.67:32132/EoDd virustotal.com/gui/file/f5865… virustotal.com/gui/file/a33f2…

RacWatchin8872's tweet image. #Malware #Backdoor #Metasploit
💣123.60.104.67:9999💣
- 1722937766.elf - Metasploit C2: 36.138.146.107:8554
- 浙江迪艾智控科技股份有限公司-薪资表.exe - Metasploit C2: hxxp://123.60.104.67:32132/EoDd

virustotal.com/gui/file/f5865…
virustotal.com/gui/file/a33f2…
RacWatchin8872's tweet image. #Malware #Backdoor #Metasploit
💣123.60.104.67:9999💣
- 1722937766.elf - Metasploit C2: 36.138.146.107:8554
- 浙江迪艾智控科技股份有限公司-薪资表.exe - Metasploit C2: hxxp://123.60.104.67:32132/EoDd

virustotal.com/gui/file/f5865…
virustotal.com/gui/file/a33f2…
RacWatchin8872's tweet image. #Malware #Backdoor #Metasploit
💣123.60.104.67:9999💣
- 1722937766.elf - Metasploit C2: 36.138.146.107:8554
- 浙江迪艾智控科技股份有限公司-薪资表.exe - Metasploit C2: hxxp://123.60.104.67:32132/EoDd

virustotal.com/gui/file/f5865…
virustotal.com/gui/file/a33f2…
RacWatchin8872's tweet image. #Malware #Backdoor #Metasploit
💣123.60.104.67:9999💣
- 1722937766.elf - Metasploit C2: 36.138.146.107:8554
- 浙江迪艾智控科技股份有限公司-薪资表.exe - Metasploit C2: hxxp://123.60.104.67:32132/EoDd

virustotal.com/gui/file/f5865…
virustotal.com/gui/file/a33f2…

#Metasploit #Malware 💣89.197.154.116💣 Files: Excel.exe - Meterpreter Shell Macro.vbs - Creates and Executes an Exe named uWeBbVRuMcAR.exe (connects to C2) Monitor.exe - Marte Beacon C2:89.197.154.116:7810 app.any.run/tasks/c2eebee7… tria.ge/240908-q53hba1… virustotal.com/gui/file/5e436…

RacWatchin8872's tweet image. #Metasploit #Malware
💣89.197.154.116💣
Files:
Excel.exe - Meterpreter Shell
Macro.vbs - Creates and Executes an Exe named uWeBbVRuMcAR.exe (connects to C2)
Monitor.exe - Marte Beacon

C2:89.197.154.116:7810
app.any.run/tasks/c2eebee7…
tria.ge/240908-q53hba1…
virustotal.com/gui/file/5e436…
RacWatchin8872's tweet image. #Metasploit #Malware
💣89.197.154.116💣
Files:
Excel.exe - Meterpreter Shell
Macro.vbs - Creates and Executes an Exe named uWeBbVRuMcAR.exe (connects to C2)
Monitor.exe - Marte Beacon

C2:89.197.154.116:7810
app.any.run/tasks/c2eebee7…
tria.ge/240908-q53hba1…
virustotal.com/gui/file/5e436…
RacWatchin8872's tweet image. #Metasploit #Malware
💣89.197.154.116💣
Files:
Excel.exe - Meterpreter Shell
Macro.vbs - Creates and Executes an Exe named uWeBbVRuMcAR.exe (connects to C2)
Monitor.exe - Marte Beacon

C2:89.197.154.116:7810
app.any.run/tasks/c2eebee7…
tria.ge/240908-q53hba1…
virustotal.com/gui/file/5e436…

#الأمن_السيبراني 🛡️ من الاختراق إلى السيطرة، كشف أسرار وحدات ما بعد الاستغلال المتقدمة في Metasploit 💣☢️.. 🛡️ ما هي وحدات ما بعد الاستغلال (Post-Exploitation Modules)؟ ☠️ هي مكونات برمجية (أدوات أو سكربتات) مدمجة في إطار عمل #Metasploit ،،، تابع 👇🏻

GREENARM0R's tweet image. #الأمن_السيبراني

🛡️ من الاختراق إلى السيطرة، كشف أسرار وحدات ما بعد الاستغلال المتقدمة في Metasploit 💣☢️..

🛡️ ما هي وحدات ما بعد الاستغلال (Post-Exploitation Modules)؟ ☠️

هي مكونات برمجية (أدوات أو سكربتات) مدمجة في إطار عمل #Metasploit ،،، تابع 👇🏻

Fake Kali Linux domain used to spread malware. #metasploit found on the domain urlhaus.abuse.ch/host/tools.kal… #xml #opendir

banthisguy9349's tweet image. Fake Kali Linux domain used to spread malware.
#metasploit found on the domain
urlhaus.abuse.ch/host/tools.kal…

#xml #opendir

Echo “ Hello 🙋‍♂️ “ > KU.text #metasploit

HF_AL3NZE's tweet image. Echo  “ Hello 🙋‍♂️ “  > KU.text 

#metasploit
HF_AL3NZE's tweet image. Echo  “ Hello 🙋‍♂️ “  > KU.text 

#metasploit
HF_AL3NZE's tweet image. Echo  “ Hello 🙋‍♂️ “  > KU.text 

#metasploit

Meterpreter Found 192[.]64[.]83[.]210/service[.]exe 02263f1bd15e4364a463117bb79c7d7e7e8a75da47006b74ba4c976b34e15c5e C2: 192[.]64[.]83[.]210:7890 AS19318 IS-AS-1 🇺🇸 #Metasploit @500mk500 @abuse_ch

skocherhan's tweet image. Meterpreter Found 
192[.]64[.]83[.]210/service[.]exe
02263f1bd15e4364a463117bb79c7d7e7e8a75da47006b74ba4c976b34e15c5e

C2: 192[.]64[.]83[.]210:7890
AS19318 IS-AS-1 🇺🇸
#Metasploit @500mk500 @abuse_ch

Loading...

Something went wrong.


Something went wrong.


United States Trends