Summary

In this chapter, we've covered a wide range of topics ranging from bypassing firewalls to interacting with websites. We've performed these tasks after usage of various tools and different methodologies, which enabled us to attack the victim machine with our attacker machine or encrypt and decrypt our messages.

In this next chapter, we'll cover privilege escalations pertaining to weak service file permissions, preparing vulnerable software, breaching legitimate windows service via a backdoor, and creating a new admin account.

Get Python for Offensive PenTest now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.