O'Reilly logo

Building Virtual Pentesting Labs for Advanced Penetration Testing by Kevin Cardwell

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Client-side exploitation

Thus far, most of what we have covered has been a form of client exploitation. In this section, we will look at more methods of attacking a client. We will continue to exploit the machine using the vector of a client, clicking on a link or file and being directed to our attacker machine. Before we continue, we want to reiterate that at the time of writing this book, we used the latest and greatest attacks that were available. By the time you read this book, some things will have changed. However, the one thing that will remain constant is the process and methodology. As long as you continue to follow the systematic process, you will be able to uncover and identify the latest techniques and modify your approach accordingly. ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required