A Guide to Hacking Without Metasploit

What? No Metasploit?

Ah the old “try harder” wisdom nugget. If taken in the right context, it is a slogan to live by. Unfortunately, most people don’t take it in the right context. Nine times out of ten, this statement is thrown around by egotistical fart clouds on IRC. In that context, it’s degrading and unhelpful.

How do we hack without using Metasploit? I could say “try harder!” and end the article with a smarmy…

--

--

--

Pentester | Hubby | Musician

Love podcasts or audiobooks? Learn on the go with our new app.

Recommended from Medium

All you need to know about the Cybersecurity for transportation and logistic industry

6 ways to avoid SPF failures if you are reaching the DNS lookup limit

6 ways to avoid SPF failures if you are reaching the DNS lookup limit

The POWER Of: Mobile First Design Thinking

Tachyon Protocol Weekly Report #81

{UPDATE} World of Cubes Survival Craft Hack Free Resources Generator

D3 Supports Every Tier of SOC Analysts

{UPDATE} Se Vira Hack Free Resources Generator

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Luke Stephens (@hakluke)

Luke Stephens (@hakluke)

Pentester | Hubby | Musician

More from Medium

Year of the Fox — TryHackMe

This Tech_Supp0rt:1 website could get you in Scam| THM |iconv

Try Hack Me: Cyborg

Active Directory Certificate Services: Domain Dominance