Results 1 to 4 of 4

Thread: Finding the right exploit to use for a known vulnerability

  1. #1
    Join Date
    2015-Dec
    Posts
    10

    Finding the right exploit to use for a known vulnerability

    I've been testing out the metasploit framework and nexpose on my own network, playing around with pentesting, and nexpose showed two main vulnerabilities in my windows 8.1 64bit system, (cifs-smb-signing-disabled) and (cifs-smb-signing-not-required). I've spent a good chunk of time searching on how to exploit those vulnerabilities, but im coming up with nothing relevant. Im new to all this, so my question is, how do you guys find the correct exploit to use?

  2. #2
    Join Date
    2013-Apr
    Location
    Kali forums
    Posts
    805
    There's no easy answer to this question. It really boils down to research, hard work, and sometimes luck.

    By design, exploits are making software do what it wasn't intended to do. You might strike out with canned exploits a number of times before you find one that works.

  3. #3
    Join Date
    2015-Dec
    Posts
    10
    Has anyone had decent success with Armitage's Hail Mary attack? Noisy, but if nobody is paying any attention, shouldn't matter

  4. #4
    Join Date
    2013-Apr
    Location
    Kali forums
    Posts
    805
    I've honestly never tried it.

    Very true

Similar Threads

  1. Replies: 1
    Last Post: 2018-07-22, 07:08

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •