Components with Known Vulnerabilities
Date: 03, January, 2021
Author: Dhilip Sanjay S
Company/Entity that you're pen-testing is using a program that already has a well documented vulnerability.
For example, a company hasn't updated their version of Wordpress for a few years - you can used tools like wpscan to find its version.
You can even find better exploit for RCE on Exploit-db.
Solutions
How many characters are in /etc/passwd (use wc -c /etc/passwd to get the answer)
Answer: 1611
Steps to Reproduce:
Find an exploit for the book store application.
Search for
book store
in exploit-db. Look forRemote Code Execution
.Execute the payload as instructed.
Exploit code:
Execution of the exploit code:
Last updated