if you have an EXE disguised from metasploit you can do a reverse_shell exploit into his/her computer
other than that you’ll do a social engineering with phishing attacks so that you can ship your reverse_shell exploit and hopefully that person could double click it.
but that wont be ETHICAL in this forum….i gave you a suggestion/possible…[Read more]
hmmm stealth scans? why not muddying the waters of their log files? like use the Decoy functionality in nmap with matching spoofing of MAC and slowing down your timing….assuming you got target IPs you can do a ZOMBIE technique with Decoy….it will surely slowdown the guys who will try to trace the attack…
awesome!!! hopefully i can have the same skills as you have and your certifications…by the way i dont know if its just me but when i login here at Ethical Hacker Network and click forum it doesnt display anything…what i do is select topics in “Recent Forum Topic”…is there something wrong? ???
thank you for the warm welcome…hopefully i’ll become experts/professional as you guys…im looking forward to becoming a security professional/expert/analyst soon…coz im F*^% bored in my current JOB…thats why im trying to shift my career into security anywayz….
actually ive taken the CBT online (3x)unfortunately i cant share it because…[Read more]