Skip to Content
Ethical Hacking and Penetration Testing Guide
book

Ethical Hacking and Penetration Testing Guide

by Rafay Baloch
September 2017
Beginner
532 pages
13h 31m
English
Auerbach Publications
Content preview from Ethical Hacking and Penetration Testing Guide

Chapter 8Client Side Exploitation

The server side is getting stronger by the day, but the client is still left vulnerable, like the saying goes “There is no patch to human stupidity.” This chapter will introduce the readers to various client side exploitation techniques that can be used in a penetration test. Client side exploits are useful in the cases where the victim is behind a router, Nat or firewall, or anything not directly reachable to us.

The success of client side exploitation is directly proportional to the amount of time you spend performing reconnaissance. This means that you need to gather personal information about the target victim such as likes, dislikes, favorite pet names, etc. Social media are the best source for this kind ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Ethical Hacking

Ethical Hacking

Daniel G. Graham

Publisher Resources

ISBN: 9781351381345