Back to top


Computer Security

In issue 187's Computer Security tutorial, we showed you how to find, modify and use exploits which are regarded as reliable. We used OWASP ZSC (http://bit.ly/lud_zsc), Metasploit Framework (https://metasploit.com), Nmap Script Engine (http://bit.ly/lud_nmap) and Sift (http://bit.ly/lud_sift).

We would strongly advise downloading the latest versions from their respective sites.

Note: The solution to the challenge is in the ZIP.

#187

This content is available for immediate download to owners of the magazine.


  • Filesize:

Future is an award-winning international media group and leading digital business. We reach more than 57 million international consumers a month and create world-class content and advertising solutions for passionate consumers online, on tablet and smartphone, and in print.

Found a problem? Report it.