EternalBlue

Why your exploit completed, but no session was created? Try these fixes..

Why your exploit completed, but no sessions was created? Try these fixes logo

When using Metasploit Framework, it can be quite puzzling trying to figure out why your exploit failed. All you see is an error message on the console saying “Exploit completed, but no session was created”. There can be many reasons behind this problem and in this blog post we will look on possible causes why

Why your exploit completed, but no session was created? Try these fixes.. Read More »

Metasploit Auxiliary Modules (Detailed Spreadsheet)

Metasploit Auxiliary Modules (Detailed Spreadsheet) logo

On this page you will find a comprehensive list of all Metasploit auxiliary modules that are currently available in the latest Metasploit Framework, the most popular penetration testing platform. I’m hoping that this list will help you navigate through the quantity of Metasploit auxiliary modules more easily and save you time during your penetration testing

Metasploit Auxiliary Modules (Detailed Spreadsheet) Read More »

List of Metasploit Windows Exploits (Detailed Spreadsheet)

List of Metasploit Windows Exploits (Detailed Spreadsheet) logo

On this page you will find a comprehensive list of all Metasploit Windows exploits that are currently available in the open source version of the Metasploit Framework, the number one penetration testing platform. It is my hope that this list will help you navigate through the vast lists of Metasploit exploits more easily and help

List of Metasploit Windows Exploits (Detailed Spreadsheet) Read More »

Top 10 Vulnerabilities: Internal Infrastructure Pentest

Top 10 vulnerabilities found during internal network penetration tests logo

Have you ever wondered what are the most common vulnerabilities found during penetration tests? What are some of the typical security problems of corporate networks? In this article we will be going through the Top 10 list of the most reported vulnerabilities during internal infrastructure penetration tests. Disclaimer The following information was compiled from more

Top 10 Vulnerabilities: Internal Infrastructure Pentest Read More »