Go to the Exploit Database (http://www.exploit-db.com/) or CVEDetails
(http://www.cvedetails.com) and select
two exploits to research and implement. Write a report that details each exploit. The requirements for the report are as
The research section of the report should explain:
The CVE of the exploit
The method used to exploit
The severity of the exploit
The affected system(s), and
any damage caused by the exploit.
Proper citation of
references that you used in your research
The implementation section of the report should include:
The setup that you used to
implement the exploit (i.e. target OS and exploitation platform such as
A step-by-step guide to the
implementation including screen shots.