Feb 27, 2015
First, I want to give credit to the author where I first found how to do this: Astr0baby's Blog. This article was dated, so I took the script on his p ...
Apr 10, 2014
Welcome back, my budding hackers!I've written several listener guides on creating a malicious PDF or malicious Word document that would carry in it a ...
Feb 7, 2013
Welcome back, my tenderfoot hackers!In some of my past articles, I've shown numerous ways of embedding a listener/rootkit on a remote system, includin ...