Follow us on Twitter!
It is the path of least resistance that makes rivers and men crooked. - Bj Palmer
Saturday, April 19, 2014
Navigation
Home
HellBoundHackers Main:
HellBoundHackers Find:
HellBoundHackers Information:
Learn
Communicate
Submit
Shop
Challenges
HellBoundHackers Exploit:
HellBoundHackers Programming:
HellBoundHackers Think:
HellBoundHackers Track:
HellBoundHackers Patch:
HellBoundHackers Other:
HellBoundHackers Need Help?
Other
Members Online
Total Online: 28
Guests Online: 26
Members Online: 2

Registered Members: 82841
Newest Member: and3rv1sh
Latest Articles
View Thread

HellBound Hackers | Computer General | Web hacking

Page 2 of 2 < 1 2
Author

RE: FTP


Member

Your avatar

Posts:
Location:
Joined: 01.01.70
Rank:
Guest
Posted on 16-10-08 14:35
whitecell wrote:
...
how would you arrange these based on difficulty? And if so inclined could you add to the list?


Well I suppose it all depends on what versions of what software they are using. Obviously if they have a very up-to-date piece of software its going to be very difficult to find vulnerabilities in it. However if they are using a piece of software from 1998 or something, it's going to be riddled with vulnerabilities.

Also I suppose it depends on what you have learnt more about, if you know a lot about POP3 but know very little about TELNET then your going to find POP3 a lot easier to exploit.


Author

RE: FTP


Member

Your avatar

Posts:
Location:
Joined: 01.01.70
Rank:
Guest
Posted on 16-10-08 19:32
okay kind of what I expected, kind of an ambiguous way of looking at the list.
Page 2 of 2 < 1 2