Exploiting Software Based Vulnerabilities : Attacking Network - Pentesting Network
Vulnerabilities exist on a particular machine can be software and hardware based. Today we will see how we can Exploit Software Based Vulnerabilities to take over target machine.
Software based vulnerabilities are nothing, but just a coding/programming error exist in a Particular software version or series. Which can be hacked/compromise using a group of malicious code called as an "Exploit".
First we have identified a SMTP service on our target machine 192.168.131.137
SLmail smtpd 5.5.0 4433 is running in port 25