O'Reilly logo

Building Virtual Pentesting Labs for Advanced Penetration Testing by Kevin Cardwell

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 12. Exploring Client-side Attack Vectors

In this chapter, we will identify the methods we use to attack clients. Unlike our servers, the client does not provide services; therefore, it is not a simple task to get the client to wait for us to attack it. Instead, we will use techniques to get the client to come to us. In this chapter, we will discuss the following topics:

  • Client-side attack methods
  • Pilfering data from the client
  • Using the client as a pivot point
  • Client-side exploitation
  • Binary payloads
  • Malicious PDF files
  • Bypassing antivirus and other protection tools
  • Obfuscation and encoding

This chapter will provide us with information about the ways we can target clients. We will explore the different methods of attacking a client. We will also ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required