Skip to main content

Posts

Showing posts from May, 2019

Exploit Development Windows Part - 4

Finding Vulnerability in Application (practice demo) Basic Requirements What you need to cover this module is the prior reading of the previous three modules and a virtual lab setup at your side in order to practice this workshop thoroughly. Exploit Development Lifecycle Analyzing Application       How does it work? In the previous modules, we have been highlighting the fact that you need to first understand the normal behavior of the application. If you know how the application works normally, only then can you detect the abnormal activity. So I believe that you have now installed and configured the lab setup into your machine. Let’s play with the Free Float FTP Server.        In the above figure, FreeFloat FTP Server is running normally on IP Address 172.20.10.14 and the port it is listening on is 21 TCP.    Let’s have a look at the exploit development life cycle we explained in the previous module.  As this is a very basic application, you don’t need to

Exploit Development Windows Part - 3