Chapter 8Client Side Exploitation

The server side is getting stronger by the day, but the client is still left vulnerable, like the saying goes “There is no patch to human stupidity.” This chapter will introduce the readers to various client side exploitation techniques that can be used in a penetration test. Client side exploits are useful in the cases where the victim is behind a router, Nat or firewall, or anything not directly reachable to us.

The success of client side exploitation is directly proportional to the amount of time you spend performing reconnaissance. This means that you need to gather personal information about the target victim such as likes, dislikes, favorite pet names, etc. Social media are the best source for this kind ...

Get Ethical Hacking and Penetration Testing Guide now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.