Types of Exploits Types of Exploits in Metasploit: 1) Active 2) Passive > The core difference between these two exploit types is that the active type exploits a specific target before it terminates, whereas the passive type waits until an incoming host connects before exploiting. It helps to know these beforehand, as the difference will play a clearer role when you graduate to writing more complicated exploits. - Setup The software we will use in this tutorial include the following: 1) The exploit: For the purpose of this short guide, we will be using a pre-existing vulnerability in the freefloat FTP server. Immunity debugger: This is used in creating exploits and reverse-engineering binary files. You can easily come by a good debugger available online for free. 2) Windows XP service pack 3 installed Kali Linux: Obviously, the undisputed leading pen testing aid. Mona.py: A Python-based plugin that helps with immunity debugging. Download Mona.py and move it to the immunity debugger directory (the py command folder). ruforum
Information
- Show
- Published6 September 2020 at 14:05 UTC
- Length2 min
- Episode1
- RatingClean