In this post we’ll show you how to use the Metasploit Framework to exploit Java CVE-2013-0422 vulnerability. This applies to Java versions under 11.
Here is the step by step procedure to exploit this vulnerability: Continue reading
If you use Metasploit you may have had the need where you have to leave your exploit to execute another one or just to run a normal Linux command (remember that while using the Metasploit prompt msf> you can still execute Linux commands). The following steps show you how you can manage more than one exploit without stopping them. Continue reading
You can start a handler with Metasploit at any time, this is useful when you are executing a backdoor in a victim’s machine and you need to connect back to take control. Now we’ll show you the steps you need to start your handler at the same port of your backdoor. Continue reading
You can create an executable backdoor with Metasploit using the msfpayload command, the following steps show you the process. Continue reading