Goatboy wrote:Generally, you would research the specific service (version, release, etc.) and search for vulnerabilities. There are a few ways to do this. You can download the source code yourself (if it is open-source or you have a way of getting it) and review it. You can Google it, or use one of the many vulnerability databases. You can use metasploit to speed up this process, but make sure you're actually learning something instead of just aiming it at a server and hoping for a result.
Users browsing this forum: No registered users and 0 guests