Results 1 to 7 of 7

Thread: How to Find Vulnerable Software?

Hybrid View

  1. #1
    Junior Member
    Join Date
    May 2012
    Posts
    1

    How to Find Vulnerable Software?

    Hi,

    I want to set up a hack lab, and eventually start creating challenges. The only problem is that I can't find any vulnerable software (for Linux) that works with Metasploit.

    The stuff I do find (on exploit-db) won't compile.

  2. #2
    Member
    Join Date
    Feb 2012
    Posts
    30
    Just break into things outright. Don't even give it much thought... just do it.

    http://www.zone-h.org/mirror/id/11742978

    This was done using nothing more than a web browser. I was practically given write access by default. Took a total of... five seconds to break in.

    And the actual defacement happend after I replaced the SCADA software with stuxnet style malware.

  3. #3
    THE Bastard Sys***** dinowuff's Avatar
    Join Date
    Jun 2003
    Location
    Third planet from the Sun
    Posts
    1,253
    Quote Originally Posted by Ted Kaczynski View Post
    Just break into things outright. Don't even give it much thought... just do it.

    http://www.zone-h.org/mirror/id/11742978

    This was done using nothing more than a web browser. I was practically given write access by default. Took a total of... five seconds to break in.

    And the actual defacement happend after I replaced the SCADA software with stuxnet style malware.
    Stuxnet style malware? Dude the delivery mechanism for stuxnet was a road apple? Please share more!!!
    09:F9:11:02:9D:74:E3:5B8:41:56:C5:63:56:88:C0

  4. #4
    Only african to own a PC! Cider's Avatar
    Join Date
    Jun 2003
    Location
    Israel
    Posts
    1,683
    Quote Originally Posted by dinowuff View Post
    Stuxnet style malware? Dude the delivery mechanism for stuxnet was a road apple? Please share more!!!
    A road apple that was meant to be a targeted attack and someone put code in there so it slipped into the wild. I read today that the US and Israel were the authors , confirmed. Cant find the article though.

    Anyhow I am also intrigued at specs comments.
    The world is a dangerous place to live; not because of the people who are evil, but because of the people who don't do anything about it.
    Albert Einstein

  5. #5
    THE Bastard Sys***** dinowuff's Avatar
    Join Date
    Jun 2003
    Location
    Third planet from the Sun
    Posts
    1,253
    Quote Originally Posted by Cider View Post
    A road apple that was meant to be a targeted attack and someone put code in there so it slipped into the wild. I read today that the US and Israel were the authors , confirmed. Cant find the article though.

    Anyhow I am also intrigued at specs comments.
    Dude that info is everywhere on the www, IRC and Bush Drums! US is even taking responsibility for FLAME; however, I would never take responsibility for a 20 MB keylogger!
    09:F9:11:02:9D:74:E3:5B8:41:56:C5:63:56:88:C0

  6. #6
    Just Another Geek
    Join Date
    Jul 2002
    Location
    Rotterdam, Netherlands
    Posts
    3,401
    How to Find Vulnerable Software?
    Patience and perserverance.

    Rome wasn't built in one day.
    Oliver's Law:
    Experience is something you don't get until just after you need it.

  7. #7
    Only african to own a PC! Cider's Avatar
    Join Date
    Jun 2003
    Location
    Israel
    Posts
    1,683
    Yes that info was on the web but there was no concrete evidence :P
    The world is a dangerous place to live; not because of the people who are evil, but because of the people who don't do anything about it.
    Albert Einstein

Similar Threads

  1. Basic things you can find from an IP
    By Irongeek in forum The Security Tutorials Forum
    Replies: 30
    Last Post: October 8th, 2007, 06:40 PM
  2. SQL Tutorial
    By ch4r in forum Other Tutorials Forum
    Replies: 5
    Last Post: January 18th, 2005, 08:20 AM
  3. Read Me First
    By Negative in forum The Security Tutorials Forum
    Replies: 12
    Last Post: June 2nd, 2004, 01:09 AM
  4. the anonymity tutorial
    By hot_guy in forum AntiOnline's General Chit Chat
    Replies: 3
    Last Post: August 2nd, 2003, 02:18 PM
  5. how to be a hacker
    By TURBOWEST in forum The Security Tutorials Forum
    Replies: 4
    Last Post: September 23rd, 2002, 05:46 AM

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •