Deprecation Notice: Metasploit source checkouts will NO LONGER update over SVN – Move to Git

The official home of the Metasploit Framework’s source code has been github for a while now. Ever since the move to Git, Rapid7 has operated a subversion server that allowed older Metasploit Framework environments to continue to receive updates. Soon this SVN server will shut down (it’s time). That’s what these messages are about: If […]

Read More… from Deprecation Notice: Metasploit source checkouts will NO LONGER update over SVN – Move to Git

Getting Started with Armitage and the Metasploit Framework (2013)

So, I just realized there isn’t a modern tutorial on how to start Armitage and take advantage of it. There’s the documentation, but my documentation tries to cover every corner case and it’s not friendly to the novice who wants to try it out quickly. I do not know of a getting started guide that is up […]

Read More… from Getting Started with Armitage and the Metasploit Framework (2013)

Tactics to Hack an Enterprise Network

In June 2012, I released Cobalt Strike, a commercial penetration testing package that picks up where Armitage leaves off. Cobalt Strike is a direct expression of what I think a penetration test looks like. If you’re interested in this vision, this post will walk you through it. The term penetration test is overloaded and may mean something different with […]

Read More… from Tactics to Hack an Enterprise Network

One Shot, One Kill – An Intelligent Web Drive-by Exploit Server

One of my favorite features in Cobalt Strike is the system profiler. This web application digs deep into your browser to discover the client-side applications that I, as the attacker, can touch. To go along with the system profiler, I maintain a database that maps these applications to exploits in the Metasploit Framework. The system […]

Read More… from One Shot, One Kill – An Intelligent Web Drive-by Exploit Server