Steal cookies, use or eat them?


Upon researching how to run Karmetasploit on my laptop, my next finding is to figure out how do I use these cookies.  I haven’t got any answers but here are some relevant data to my findings.

1.) http://www.offensive-security.com/metasploit-unleashed/Karmetasploit_Attack_Analysis
2.) http://www.linuxweblog.com/postgresql-reference
3.) http://www.youtube.com/watch?v=hL3H70jcSEo

Advertisements

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

%d bloggers like this: