Cybersecurity Resource Center
Is it Possible to Install Metasploit on the iSH app?
Have you ever wondered whether it’s possible to run Metasploit on the iSH app on iPhone? Well, we took a look to see what was possible, and here are our results:
Linux Privilege Escalation: Polkit pkexec Pwnkit – CVE-2021-4034
Privilege escalation on any operating system tends to be quite situational. However, the latest privilege escalation exploit on Linux appears to be a game changer in terms of gaining root access on Linux systems.
Windows Hacking: Reconnaissance Tools
Knowing who is an admin on Windows systems as well as where they are logged on is an important start to hacking an Active Directory environment.
Beginner Cybersecurity Questions: Career Edition
Interested in Cybersecurity? Take a look at some of our views on the cybersecurity field!
Kali Linux on Android: Using NetHunter Rootless
Interested in having a mobile version of Kali on your Android phone? Take a look at our video to see how to do it using NetHunter Rootless!
Bypassing Antivirus: Using Veil Evasion
Even though Veil is a tool that has been out for some time, it’s still useful to see how it can be used to bypass antivirus solutions.
Log4J Vulnerability: Fun with Java Exploitation
With all the fuss about the Log4J vulnerability, I thought I’d make a video explaining it at a high level and demonstrating an exploit on the vulnerability. Take a look!
iPhone Hacking: Command and Control with the Empire Framework
In my last iPhone video, we looked at how we can get a reverse shell from the iSH app on iPhone. This limited us to the Linux environment that the iSH app gives you.
Netcat Reverse Shells: iPhone and iSH
I couldn’t create a Android hacking video without doing an accompanying iPhone hacking video as well! Let’s see how we can demonstrate the use of reverse shells with an iPhone and the iSH app!
- « Previous
- 1
- 2
- 3