Kali Linux

Why your exploit completed, but no session was created? Try these fixes..

Why your exploit completed, but no sessions was created? Try these fixes logo

When using Metasploit Framework, it can be quite puzzling trying to figure out why your exploit failed. All you see is an error message on the console saying “Exploit completed, but no session was created”. There can be many reasons behind this problem and in this blog post we will look on possible causes why […]

Why your exploit completed, but no session was created? Try these fixes.. Read More »

Why is your Meterpreter session dying? Try these fixes..

Why is your Meterpreter session dying? Try these fixes logo

When using Metasploit Framework, you have probably experienced many times that your meterpreter session has died and you see on the console error message saying “Meterpreter session 1 closed. Reason: Died”. In this blog post we will examine reasons why these errors happen and provide solutions on how to fix it. Reason 1: Incompatible Metasploit

Why is your Meterpreter session dying? Try these fixes.. Read More »

Install Nessus and Plugins Offline (with pictures)

Nessus offline install and plugins update tutorial logo

In this tutorial we will be detailing installation and update of the Nessus Professional vulnerability scanner and its plugins using the Offline method. Offline method is useful in situations where we are required to perform a vulnerability scan of an isolated environment, without having access to the Internet. This tutorial follows the official Tenable instructions

Install Nessus and Plugins Offline (with pictures) Read More »

RCE on Windows from Linux Part 5: Metasploit Framework

RCE on Windows from Linux using Metasploit logo

In this post we will be detailing RCE capabilities of the Metasploit Framework (MSF) – the world’s most popular penetration testing framework. This is the 5th part of the blog post series focused on tools capable of authenticated remote command execution (RCE) on Windows machines from Linux (Kali). Introduction As mentioned in the previous parts

RCE on Windows from Linux Part 5: Metasploit Framework Read More »