ApeRock's Popular Posts

Forum Thread : Using Exploits from Exploit-db.com

I read this tutorial from OTW on using new modules in Metasploit: http://null-byte.wonderhowto.com/how-to/hack-like-pro-metasploit-for-aspiring-hacker-part-9-how-install-new-modules-0162503/ It was very useful, but now I'm stuck. I suppose everyone has heard of the Hacking ...more

Forum Thread : Looking for Python Projects

Hey everyone, I was wondering if there are people working on Python projects that could use some help. I'm a reasonably experienced Python user and did some bigger projects for my educational program at a university. I'm always looking for fun things to work on and doing some ...more

Forum Thread : How to Run Kali on Mac Smoothly?

Hello all, I am using Kali for a couple of years on a dual boot Windows pc now, but for mobility purposes I bought a Macbook Pro Retina. I ran Kali in VirtualBox, but because it has a problem with the retina resolution it looks blurry and therefor is not really pleasant to wo ...more

Forum Thread : The Best Way to Encrypt Files

Hallo everyone, I was wondering: what do you guys think is the best way to encrypt your files? Personally I use VeraCrypt (with AES) which works fine, but of course I am always looking for possible improvements. Looking forward to your opinions!

Forum Thread : Huge Android Leak

Just wanted to share this with you: http://venturebeat.com/2015/07/27/researchers-find-vulnerability-that-affects-95-of-android-devices/ Let's just hope they will explain us how to use this vulnerability at Black Hat!

Forum Thread : Stuck at 'Sending SWF'

I tried out the Hacking Team Flash exploit (https://www.exploit-db.com/exploits/37523/), but I can't get it to work. When my victim pc (of which I made sure it was vulnerable to the exploit) browses to the malicious link, I get the following output in Metasploit every time: * ...more

Forum Thread : An Interesting Chance

Imagine you gained access to someones Google and Outlook accounts. Cool, but of course not enough for an aspiring hacker that always wants more. How would you guys use this privilege to gain access to a victims computer or maybe phone? I keep walking around with the idea that ...more

Next Page
Prev Page