O'Reilly logo

BackTrack 4: Assuring Security by Penetration Testing by Shakeel Ali, Tedi Heriyanto

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 9. Target Exploitation

Keeping your projections on assisting penetration testing by attempting to exploit the vulnerability discovered in a target network environment is a key role of this chapter. To stimulate and explore the best options available to exploit your target you have to carry out careful examination, research, and use of advanced tools and techniques. The exploitation process practically finalizes the penetration operation. However, there could be situations where the penetration tester may be asked to attempt in-depth access (that is pivoting) to network farm and escalate his privileges to the administration level in order to prove his presence. Such requirements are challenging and uncertain. However, as a qualified and ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required