In a post yesterday I said how I was writing a paper for my final. In the research process, I stumbled upon this nifty little
Thursday, October 8, 2009
Wow...So That's How it Works?!
As a disclaimer, I am not showing you this so that you can go and maliciously target a system. This is educational only... Now, with that out of the way:
In a post yesterday I said how I was writing a paper for my final. In the research process, I stumbled upon this nifty littlevideo . The video walks through how to perform a Buffer Overflow attack on a target using Fast-track, which is apart of the BackTrack disto. Fast-track trully lives up to it's name and statement of, "Where it's ok to finish in under 3 minutes..." As you can see by the video, the attacker is able to perform the buffer overflow attack on the target system and get a command prompt in 30 seconds. You know that he has obtained access to the target because he is running Linux and the starting prompt is ' root@... ' and when he successfully attacks the system his prompt changes to C:\windows. He is then able to run the 'whoami' command and gets the response of 'nt authority\system.'
In a post yesterday I said how I was writing a paper for my final. In the research process, I stumbled upon this nifty little
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment