how would you arrange these based on difficulty? And if so inclined could you add to the list?
Well I suppose it all depends on what versions of what software they are using. Obviously if they have a very up-to-date piece of software its going to be very difficult to find vulnerabilities in it. However if they are using a piece of software from 1998 or something, it's going to be riddled with vulnerabilities.
Also I suppose it depends on what you have learnt more about, if you know a lot about POP3 but know very little about TELNET then your going to find POP3 a lot easier to exploit.
Posts: Location: Joined: 01.01.70 Rank: Guest
Posted on 16-10-08 19:32
okay kind of what I expected, kind of an ambiguous way of looking at the list.