Introduction to exploiting

The exploitation phase is the process of gaining control over a system. This process can take many different forms, but the ultimate goal is always the same: to obtain administrative-level access to the attacked computer.

Exploitation is the phase of the most free execution, since each system is different and unique. Depending on the scenario, attack vectors vary from one target to another, since different operating systems, different services, and different processes require different types of attacks. Skilled attackers must understand the nuances of each system they intend to exploit and, eventually, they will be able to perform their own exploits.

Get Mastering Python for Networking and Security now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.