Alot of people ask me about exploits, what they are, what they do, and how to use them. Well, I'm writing this Post to explain this for hopefully my last time. It's just starting to bother me that I have to explain this every time I'm on Facebook Chat, so i thought there should be a text explaining them.
Well, here it is.
[#] Exploit
An Exploit is a piece of code or program that take Advantage of a bug , weakness or vulnerability in specific software, leading to privilege escalation or DoS attacks on the target.
Well to explain this simply, a Exploit is a program that 'exploits' a bug in a specific software
All exploits are different, they do different things exploit different bugs, thats why exploits are allways program specific.Exploits are made to get root on different operating systems. They achieve this by exploiting a bug in software when the software is running as root.
In UNIX type OS's, software may have to run as root ( or UID 0 ) in order to perform a specific task that cannot be performed as another user. So basically the exploit crashes the software while running as root to give you the beautiful root prompt.
[#] How to Use Exploits
First Of All You should Know that Exploits are Coded In Different Languages Like Perl, PHP, Python and Mostly in C++ And if You are Using Windows OS then you have to install all these Programming Languages to Run these Exploits, Otherwise I will recommended You to Use Backtrack Or Kali Linux, Because all these Programming Languages are Preinstalled so that you can run all these Exploits Easily without any Installations .
So here Iam Using Kali Linux to Run Exploits on My Target :P.
# Using PHP Exploits
1) PHP exploit code usually starts with <?php and ends in ?>
2) Copy the PHP exploit code into notepad, Edit Code as per your Target and save it as “exploit.php”, on your desktop.
3) Next open up the terminal and go to your Desktop by using the CD (change directory)
command
cd Desktop
4) Now run the Exploit
php exploit.php
Well, here it is.
[#] Exploit
An Exploit is a piece of code or program that take Advantage of a bug , weakness or vulnerability in specific software, leading to privilege escalation or DoS attacks on the target.
Well to explain this simply, a Exploit is a program that 'exploits' a bug in a specific software
All exploits are different, they do different things exploit different bugs, thats why exploits are allways program specific.Exploits are made to get root on different operating systems. They achieve this by exploiting a bug in software when the software is running as root.
In UNIX type OS's, software may have to run as root ( or UID 0 ) in order to perform a specific task that cannot be performed as another user. So basically the exploit crashes the software while running as root to give you the beautiful root prompt.
[#] How to Use Exploits
First Of All You should Know that Exploits are Coded In Different Languages Like Perl, PHP, Python and Mostly in C++ And if You are Using Windows OS then you have to install all these Programming Languages to Run these Exploits, Otherwise I will recommended You to Use Backtrack Or Kali Linux, Because all these Programming Languages are Preinstalled so that you can run all these Exploits Easily without any Installations .
So here Iam Using Kali Linux to Run Exploits on My Target :P.
# Using PHP Exploits
1) PHP exploit code usually starts with <?php and ends in ?>
2) Copy the PHP exploit code into notepad, Edit Code as per your Target and save it as “exploit.php”, on your desktop.
3) Next open up the terminal and go to your Desktop by using the CD (change directory)
command
cd Desktop
4) Now run the Exploit
php exploit.php
No comments:
Post a Comment