Question Assignment description
Go to the Exploit Database (http://www.exploit-db.com/) or CVEDetails
(http://www.cvedetails.com) and choose
two exploits to analysis and implement. Write a report that particulars every exploit. The necessities for the report are as
follows:
The analysis part of the report ought to clarify:
1)
The CVE of the exploit
2)
The character
vulnerability/exploit
three)
The strategy used to take advantage of
the vulnerability
four)
The severity of the exploit
5)
The affected system(s), and
any harm brought on by the exploit.
6)
Correct quotation of
references that you just utilized in your analysis
The implementation part of the report ought to embrace:
1)
The setup that you just used to
implement the exploit (i.e. goal OS and exploitation platform equivalent to
Metasploit)
2)
A step-by-step information to the
implementation together with display pictures.