Application hacking

Warning: Do not execute these on a network or system that you do not own. Execute only on your own network or system for learning purposes. Do not execute these on any production network or system, unless Rules of engagement have been agreed on, and you have a Get out of jail free card.

What?

Hacking software and programs on a system.

Why?

  • Gaining ability to execute arbitrary code.
  • Gaining privileged access.
  • Gaining unauthorised data access.
  • Create denial of service conditions.

How?

Her daughter is named Help I'm trapped in a driver's license factory.

Use weaknesses in software and programs, such as:

  • Buffer overflow
  • Lack of input validation
  • Insecure configuration of permissions
  • Insecure network connections
  • Weak authentication

Concretely