Cybersecurity Resource Center
Have you ever wondered whether it’s possible to run Metasploit on the iSH app on iPhone? Well, we took a look to see what was possible, and here are our results:
Privilege escalation on any operating system tends to be quite situational. However, the latest privilege escalation exploit on Linux appears to be a game changer in terms of gaining root access on Linux systems.
Knowing who is an admin on Windows systems as well as where they are logged on is an important start to hacking an Active Directory environment.
Interested in Cybersecurity? Take a look at some of our views on the cybersecurity field!
Interested in having a mobile version of Kali on your Android phone? Take a look at our video to see how to do it using NetHunter Rootless!
Even though Veil is a tool that has been out for some time, it’s still useful to see how it can be used to bypass antivirus solutions.
With all the fuss about the Log4J vulnerability, I thought I’d make a video explaining it at a high level and demonstrating an exploit on the vulnerability. Take a look!
In my last iPhone video, we looked at how we can get a reverse shell from the iSH app on iPhone. This limited us to the Linux environment that the iSH app gives you.
I couldn’t create a Android hacking video without doing an accompanying iPhone hacking video as well! Let’s see how we can demonstrate the use of reverse shells with an iPhone and the iSH app!