How to bypass a firewall with the following rules and perform a TCP scan?

How you would bypass the following firewall rules to perform a TCP scan identifying service ports in the open (NOT open|filtered) state for hosts behind the firewall using nmap or metasploit:
• The firewall blocks incoming SYN-flagged pack… Continue reading How to bypass a firewall with the following rules and perform a TCP scan?

The right path to tcp_seq_window.nasl TCP/IP Sequence Prediction Blind Reset Spoofing DoS

Is there an easy way to go to the right path of an exploit in Metasploit? like for instance, I want to access the scanner module where it holds the TCP/IP Sequence Prediction Blind Reset Spoofing DoS exploit. But I think I’m parsing the wr… Continue reading The right path to tcp_seq_window.nasl TCP/IP Sequence Prediction Blind Reset Spoofing DoS

The past, present and future of Metasploit

Metasploit is the most used penetration testing framework. In this Help Net Security video, Spencer McIntyre, Lead Security Researcher at Rapid7, talks about how Metasploit enables defenders to always stay one step (or two) ahead of the game, and offer… Continue reading The past, present and future of Metasploit