![]() ![]() PHPMyAdmin Īpache Continuum 1.4.2 (apache_continuum_cmd_exec) > rapid7/metasploit-framework#6962Īpache with mod_cgi (apache_mod_cgi_bash_env_exec)ĪctionPack 4.2.4 (rails_actionpack_inline_exec)Ĭustom PHP login page that's vulnerable to SQL injection I am pretty sure it went un-noticed! This year I was looking for something new, and I accidentally stumbled across Metasploitable3… the Linux version! It’s an exciting story, but in summary, I was building the Windows Server 2008 version on Linux and noticed the BASH script was expecting an argument… ![]() I went to great lengths to ensure there was no trace of the phrase Metasploitable3 in the system. It is a fun assignment! Last year, I choose Metasploitable3 in the hopes that they wouldn’t find out what system they were auditing. For the first assignment in the paper, students have to perform an information security audit and document all findings in a security audit report. ![]() In my first semester of teaching Introduction to Information Security in Semester 1, 2017, I used Metasploitable2 for in-class practical lab exercises. It was an excellent platform for exploratory testing, and I was sure Metasploitable3 was going to be the same experience… it was! Metasploitable2, Metasploitable3 and InfoSec Assignments I had used the previous version, Metasploitable2, to learn the basics of penetration testing. Back in November, 2016, Rapid7 released Metasploitable3. Metasploitable3 is an intentionally vulnerable machine build for exploit testing (aka.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |