-
May 23rd, 2012, 12:53 PM
#1
Junior Member
How to Find Vulnerable Software?
Hi,
I want to set up a hack lab, and eventually start creating challenges. The only problem is that I can't find any vulnerable software (for Linux) that works with Metasploit.
The stuff I do find (on exploit-db) won't compile.
-
May 23rd, 2012, 05:48 PM
#2
Just break into things outright. Don't even give it much thought... just do it.
http://www.zone-h.org/mirror/id/11742978
This was done using nothing more than a web browser. I was practically given write access by default. Took a total of... five seconds to break in.
And the actual defacement happend after I replaced the SCADA software with stuxnet style malware.
-
May 30th, 2012, 10:14 AM
#3
How to Find Vulnerable Software?
Patience and perserverance.
Rome wasn't built in one day.
Oliver's Law:
Experience is something you don't get until just after you need it.
-
May 31st, 2012, 06:12 PM
#4
Originally Posted by Ted Kaczynski
Just break into things outright. Don't even give it much thought... just do it.
http://www.zone-h.org/mirror/id/11742978
This was done using nothing more than a web browser. I was practically given write access by default. Took a total of... five seconds to break in.
And the actual defacement happend after I replaced the SCADA software with stuxnet style malware.
Stuxnet style malware? Dude the delivery mechanism for stuxnet was a road apple? Please share more!!!
09:F9:11:02:9D:74:E3:5B 8:41:56:C5:63:56:88:C0
-
June 1st, 2012, 07:32 PM
#5
Originally Posted by dinowuff
Stuxnet style malware? Dude the delivery mechanism for stuxnet was a road apple? Please share more!!!
A road apple that was meant to be a targeted attack and someone put code in there so it slipped into the wild. I read today that the US and Israel were the authors , confirmed. Cant find the article though.
Anyhow I am also intrigued at specs comments.
The world is a dangerous place to live; not because of the people who are evil, but because of the people who don't do anything about it.
Albert Einstein
-
June 1st, 2012, 10:09 PM
#6
Originally Posted by Cider
A road apple that was meant to be a targeted attack and someone put code in there so it slipped into the wild. I read today that the US and Israel were the authors , confirmed. Cant find the article though.
Anyhow I am also intrigued at specs comments.
Dude that info is everywhere on the www, IRC and Bush Drums! US is even taking responsibility for FLAME; however, I would never take responsibility for a 20 MB keylogger!
09:F9:11:02:9D:74:E3:5B 8:41:56:C5:63:56:88:C0
-
June 2nd, 2012, 04:18 PM
#7
Yes that info was on the web but there was no concrete evidence :P
The world is a dangerous place to live; not because of the people who are evil, but because of the people who don't do anything about it.
Albert Einstein
Similar Threads
-
By Irongeek in forum The Security Tutorials Forum
Replies: 30
Last Post: October 8th, 2007, 06:40 PM
-
By ch4r in forum Other Tutorials Forum
Replies: 5
Last Post: January 18th, 2005, 08:20 AM
-
By Negative in forum The Security Tutorials Forum
Replies: 12
Last Post: June 2nd, 2004, 01:09 AM
-
By hot_guy in forum AntiOnline's General Chit Chat
Replies: 3
Last Post: August 2nd, 2003, 02:18 PM
-
By TURBOWEST in forum The Security Tutorials Forum
Replies: 4
Last Post: September 23rd, 2002, 05:46 AM
Posting Permissions
- You may not post new threads
- You may not post replies
- You may not post attachments
- You may not edit your posts
-
Forum Rules
|
|