Follow us on Twitter!
Capitalism is an Island of wealth in a sea of poverty
Friday, September 30, 2016
Navigation
Home
 Find:
 Information:
Learn
Communicate
Submit
Shop
Challenges
 Exploit:
 Programming:
 Think:
 Track:
 Patch:
 Other:
 Need Help?
Other
Members Online
Total Online: 56
Guests Online: 55
Members Online: 1

Registered Members: 95783
Newest Member: wendyll
Latest Articles
View Thread

HellBound Hackers | Computer General | Web hacking

Page 2 of 2 < 1 2
Author

RE: FTP


Member

Your avatar

Posts:
Location:
Joined: 01.01.70
Rank:
Guest
Posted on 16-10-08 14:35
whitecell wrote:
...
how would you arrange these based on difficulty? And if so inclined could you add to the list?


Well I suppose it all depends on what versions of what software they are using. Obviously if they have a very up-to-date piece of software its going to be very difficult to find vulnerabilities in it. However if they are using a piece of software from 1998 or something, it's going to be riddled with vulnerabilities.

Also I suppose it depends on what you have learnt more about, if you know a lot about POP3 but know very little about TELNET then your going to find POP3 a lot easier to exploit.


Author

RE: FTP


Member

Your avatar

Posts:
Location:
Joined: 01.01.70
Rank:
Guest
Posted on 16-10-08 19:32
okay kind of what I expected, kind of an ambiguous way of looking at the list.
Page 2 of 2 < 1 2