Metasploit to backdooring

Diposting oleh fitri-ariyanto on Monday, May 11, 2009

May already have some of the metasploit that can be used to create a backdoor.Use of this backdoor is very useful, especially as post-Exploitation method. At the time this example we will use the 2 basic methods to get the shell from the target, namely [...]
More aboutMetasploit to backdooring

PHP Shell

Diposting oleh fitri-ariyanto

Why is it that we have a site that we can hack the remote? Perhaps one of the few activities we can do with exploitation or remote file / server with shell code.hmm, the following shell code for exploitation that may be used.http://allplayoffs.com/~ [...]
More aboutPHP Shell