Chapter 3. Operating System-based Vulnerability Assessment and Exploitation

In this chapter, we will cover:

  • Exploit usage quick tips
  • Penetration testing on a Windows XP SP2 machine
  • Binding a shell to the target for remote access
  • Penetration testing on the Windows 2003 Server
  • Windows 7/Server 2008 R2 SMB client infinite loop
  • Exploiting a Linux (Ubuntu) machine
  • Understanding the Windows DLL injection flaws

Introduction

In the previous chapter, we focused on gathering information about our target. Various information included the target IP address, open ports, available services, operating system, and so on. One of the biggest assets in the process of information gathering is gaining knowledge about the operating system used by the target server or system. ...

Get Metasploit Penetration Testing Cookbook now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.