Chapter 9. Target Exploitation

Keeping your projections on assisting penetration testing by attempting to exploit the vulnerability discovered in a target network environment is a key role of this chapter. To stimulate and explore the best options available to exploit your target you have to carry out careful examination, research, and use of advanced tools and techniques. The exploitation process practically finalizes the penetration operation. However, there could be situations where the penetration tester may be asked to attempt in-depth access (that is pivoting) to network farm and escalate his privileges to the administration level in order to prove his presence. Such requirements are challenging and uncertain. However, as a qualified and ...

Get BackTrack 4: Assuring Security by Penetration Testing now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.