Validating vulnerabilities with ICMP interaction

As a penetration tester, the best outcome of any given exploit is to achieve remote code execution. However, there are cases in which we might only want to determine whether a remote code-execution vulnerability is exploitable but don't want to actually follow through the entire exploitation and post-exploitation process. One way to do this is to run a script that logs ICMP traffic and then execute a ping command on the remote system. This recipe will demonstrate how to write a custom script for validating remote code-execution vulnerabilities with ICMP traffic.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset