Now that the hacker has the name of the software being used and its version number, he would take that information and search a couple vulnerability databases for an exploit. If there’s an exploit available, he will run it against the server and take complete control. If there isn’t any, he would move onto another open port and try again on a different service.
Some of the most popular exploit databases are:
• Milw0rm
• SecurityFocus
• osvdb
•Exploit-DB
Google Search! Search Here!
Some of the most popular exploit databases are:
• Milw0rm
• SecurityFocus
• osvdb
•Exploit-DB
Google Search! Search Here!
No comments:
Post a Comment