Implementing exploits from BackTrack
In this recipe, we will examine some of the methods to implement exploits from within BackTrack 5. With each release of BackTrack, the BackTrack community comes up with new exploits, and enhancements to previous exploits. An exploit involves using a bug or vulnerability in a piece of software or program in order to cause it to work in a manner other than originally intended. This could, for example, be as simple as using a vulnerability in an application, let's say a website, that will allow us to gain access to the database server and escalate our privileges to become a superuser on the overall machine. As new software is released, potential vulnerabilities or bugs are found in those software packages. In many cases, a hacker would find the vulnerability and create an "exploit" to take advantage of the vulnerability. Due to this, the BackTrack owners and community at large continually update the distribution to include these new exploits.