April 2017
Intermediate to advanced
512 pages
7h 59m
English
In this recipe, we will exploit the vulnerabilities at the network level. These vulnerabilities are software-level vulnerabilities. When we talk about software, we are explicitly speaking about software/packages that make use of networks/ports to function. For example, FTP server, SSH server, HTTP, and so on. This recipe will cover a few vulnerabilities of two flavors, Unix and Windows. Let's start with UNIX exploitation.
We will make use of Metasploit in this module; make sure you start PostgreSQL before initializing Metasploit. We will quickly recap the vulnerabilities we found in Metasploitable2 when we performed the vulnerability scan:
The IP is different as the author has changed the VLAN ...
Read now
Unlock full access