Exploits

Viewing 5 reply threads
  • Author
    Posts
    • #3033
      cleanwithit0607
      Participant

      This may be a stupid question. I understand the concept of how exploits work.

      But, If you need a exploit for the computer(Pen Test) you’re trying to get into. Do you search Google for an exploit, and alter the code to fit your needs? Or do you write it on your own from start to finish? Metasploit aside.

      Sorry for the noob question, I just wanted to know.

    • #20693
      RoleReversal
      Participant

      Personally speaking (mostly lab work with some real-world experience):

      • Metasploit first (why reinvent the wheel? if it works, go with that and move on to something more interesting)
      • Modification of existing code (milw0rm, Packet Storm, etc.)
      • Handwritten as last option (unless practice at exploit dev is the goal)

      If all you’re looking for is access to the box I’d stick with this order.

    • #20694
      cleanwithit0607
      Participant

      @RoleReversal wrote:

      Personally speaking (mostly lab work with some real-world experience):

      • Metasploit first (why reinvent the wheel? if it works, go with that and move on to something more interesting)
      • Modification of existing code (milw0rm, Packet Storm, etc.)
      • Handwritten as last option (unless practice at exploit dev is the goal)

      If all you’re looking for is access to the box I’d stick with this order.

      Thanks RR, you’re always there when I need you, lol. I just figured if you’re doing a penetration test for a company, would you write the whole thing, I mean that would seem to take a lot of time. But then again look at my title. i.e , “Newbie”.

      I don’t really know if exploit development is the goal, because I’m still young into this, but it does sound very interesting to me.

    • #20695
      RoleReversal
      Participant

      From a business perspective writing the exploit from scratch doesn’t make sense (assuming an less intensive (Metasploit, modifying PoCs etc.) option works). All the business is interested in is if the vulnerability exists and the risk to the business.

      Proving you’re 3l1t3 and coding it yourself isn’t going to gain you anything in the business world, and may actually reduce the impact the vulnerability has on the business people. However if you can demo freely downloading a point and click application that makes their essential web-server fall over revealing corporate secrets and client CC info in a few clicks, that can definitely get the point home 😀

    • #20696
      shednik
      Participant

      I’d have to agree with RR that if you can exploit something through metasploit then by all means try that first, and if it’s on your own time for the sake of learning though go crazy with trying your own code. 

    • #20697
      cleanwithit0607
      Participant

      Thanks Guys!

Viewing 5 reply threads
  • You must be logged in to reply to this topic.

Copyright ©2020 Caendra, Inc.

Contact Us

Thoughts, suggestions, issues? Send us an email, and we'll get back to you.

Sending

Sign in with Caendra

Forgot password?Sign up

Forgot your details?