Exploitation (Chapter 8)
Exploiting a buffer overflow vulnerability in third party software
1. Do some research on CVE-2003-0264 and find out more about this vulnerability.
Write a brief description of this vulnerability including the applic
Offline Password Attack
What is hash function? How is it used to protect passwords?
a. A hash function is a function that can take data in and return an irreversible hash
that should not be able to be deciphered or read. It i
Client Side Software Exploitation (Chapter 10)
Total Point: 35
1. Give an example of a situation where you need to launch client side attacks.
a. Client-side attacks are ideal for assets such as workstations or mobile devices
that lack an In
Classwork: Introduction to Metasploit
Start Windows XP machine. In C:\WINDOWS folder, create a text file.
Note the IP address of this XP machine. Keep it running.
Start your Kali machine.
Follow instructions from the book to exploit MS08_067_n
Some post-exploitation techniques
Using Meterpreter utilities for post exploitation session
1. Start with exploiting the Windows XP system. You can use any exploit you want. The
exploit should start a Meterpreter session.