O'Reilly logo

Dissecting the Hack: The F0rb1dd3n Network, Revised Edition by Marcus J. Carey, Brian Baskin, Kent Nabors, Jayson E Street

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

CHAPTER 4

Exploit

At this point in the attack process, the attacker has canvassed the systems to find all of the points of weakness in one’s network and facilities. The attacker will weigh the pros and cons of each weakness to determine the most effective attack that will have the lowest risk involved. There are various styles of attacks that an attacker could use to this end. For many attackers, a successful intrusion means having an available cache of exploits to use at a moment’s notice. However, the major failure of such exploits is that each is written in a nonstandard format with differing interfaces and controls. Metasploit solves this issue by providing a standardized framework by which all exploits are executed in the same manner, making ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required