Crashing the vulnerable application

We will use a custom-made vulnerable application that uses unsafe functions. Let's try running the application from the command shell, as follows:

We can see that this is a small example application, which listens on TCP port 200. We will connect to this application via Telnet on port 200 and supply random data to it, as shown in the following screenshot:

After we provide the data, we will see that the connection to the target is lost. This is because the application server has crashed. Let's see what it ...

Get Mastering Metasploit - Third Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.