Question Assignment description
Go to the Exploit Database (http://www.exploit-db.com/) or CVEDetails
(http://www.cvedetails.com) and choose one OS associated exploit to research and implement. Write a report that particulars every exploit. The necessities for the report are as
follows:
The research part of the report ought to clarify:
1)
The CVE of the exploit
2)
The character
vulnerability/exploit
three)
The tactic used to use
the vulnerability
four)
The severity of the exploit
5)
The affected system(s), and
any harm brought on by the exploit.
6)
Correct quotation of
references that you simply utilized in your research
The implementation part of the report ought to embody:
1)
The setup that you simply used to
implement the exploit (i.e. goal OS and exploitation platform equivalent to
Metasploit)
2)
A step-by-step information to the
implementation together with display pictures.