What is an Exploit?
Exploits are an alternative to using a Cracker, (Except in the case of the NSA, which cannot be Exploited), and come in two parts. These parts are:
FTP Exploit - When the user is running an FTP exploit, he/she is limited to only uploading or downloading software. Installing and/or executing Software is not permitted.
SSH Exploit - When the user is running an SSH exploit, he/she can perform any action, excluding uploading and downloading Software.
These exploits, however, do not limit the User's ability to edit the Log File how he/she pleases.
If both of your FTP and SSH exploits hack successfully, you will be granted full access, as if you were hacking with a Cracker. In order for an Exploit to be successful, however, at least one of the Exploits must be a higher level than the victim's Firewall. If one of your Exploits does not successfully exploit your victim, you may still enter your victim's server, but only with the permissions of the successful exploit.
For example; I have an FTP Exploit at level 5.0 and an SSH Exploit at Level 7.0. My victim has a Firewall that is level 6.0. This means I can exploit my victim with the SSH exploit, but not the FTP, meaning I can only use the permissions that the SSH exploit gives me.
BEFORE YOU LEAVE TO DOWNLOAD THEM: Please note that you also need the Basic Port Scan in order to use the Exploits.
Where can I get the Exploits/Scanner?
You are able to download both exploits, along with the Scanner, at the Download Center.
How do I research my Exploits/Scanner?
To research a piece of Software, head to the University tab on your side-menu, then from there select the piece of Software you wish to research. Follow through and research the Software. However, your Scanner is non-researchable.
It says I have no software to research!
This is because you have not bought the License.
Alternatively, you can go into your Software tab on the side-menu, and click the little blue circle icon that's located next to the Software's name. From there, you can buy the license, (If you haven't already), and research the software following the steps I have provided above.