O'Reilly logo

Mastering Metasploit by Nipun Jaswal

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

File format-based exploitation

We will be covering various attacks on the victim using malicious files in this section. Therefore, whenever this malicious file runs, it sets the attacker, the meterpreter shell or the command shell, onto the target system. However, you will find these methods in an automated mode in the next few chapters where we will be talking specifically about social engineering methods and tricking the victim into the trap. However, let's concentrate on the manual attack techniques first.

PDF-based exploits

PDF file format exploits are those that create malicious PDF files, which when run on the victim's system, will give the attacker complete access to the target system in the form of a meterpreter shell. But before getting ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required