O'Reilly logo

Mastering Kali Linux for Advanced Penetration Testing - Second Edition by Vijay Kumar Velu

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Identifying a vulnerability using fuzzing

Attackers must be able to identify the right fuzzing parameters in any given application to find vulnerability and then exploit it. In this section, we will take an example of vulnerable server, which was created by Stephen Bradshaw This vulnerable software can be downloaded from http://sites.google.com/site/lupingreycorner/vulnserver.zip

In this example, we will be using Windows 7 as the victim running a vulnerable server.

Once the application is downloaded, we will be unzipping the file and running the server. This should open up TCP port 9999 for the remote clients to connect, When the vulnerable server is up and running you should be able to see the following screenshot:

Attackers can connect ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required