"target address" tag
UDP time

The Socket API, Part 4: Datagrams

Let’s try to develop server clients using UDP, the protocol behind some important services like DNS, NFS, etc. UDP, the User Datagram Protocol, is a connectionless protocol. This means you don’t establish a…

VNCInjection with courtesy shell enabled, by default

Metasploit 101 with Meterpreter Payload

The Metasploit framework is well known in the realm of exploit development. It is a standalone tool for security researchers, penetration testers and IDS/IPS developers. As of now, it has 640 exploit definitions…

All published articles are released under Creative Commons Attribution-NonCommercial 3.0 Unported License, unless otherwise noted.
Open Source For You is powered by WordPress, which gladly sits on top of a CentOS-based LEMP stack.

Creative Commons License.