
182 Chapter 5 • Hacking Techniques and Tools
From the response the server provided, we now know that this
system’s OS is Microsoft NT and the Web server is Microsoft’s Internet
Information Server version 4.0.This alone is more than sufficient infor-
mation on which we can base our attack.
Building an Execution Plan
When building an attack execution plan, one must take into account the
following factors:
■
A vulnerable service must be presently running and accept con-
nections from the rest of the Internet.
■
Exploits utilized must not entail any form of Denial of Service
(DoS; which would give away the attack).
■
Local or console exploits (such as booting fr ...