Skip to content

6. Project #2: Backdoor Command Execution

Thibault edited this page Mar 29, 2021 · 1 revision

Find another vunerability that will give you a shell back on the target machine.

You can use all the tools that you want except look for links that will give the exact steps to exploit the vulnerability.

You can use Google to search for software vulnerabilites. You can also use searchsploit to check if an exploit is in the database, nmap to scan the target and metasploitable-framework to exploit it.


Next Page >

Clone this wiki locally