July 2018
Beginner
564 pages
12h 22m
English
So far, we've seen really good methods in client-side attacks. These methods were good because we didn't really need to ask the client to do anything. We would gain access to the target computer if the client updated their system, or, if they downloaded something, then we'd backdoor it on the fly. These methods are really good because we don't actually need to do something, so the target has to do an action, but we don't need to ask them to do something. The only problem with these methods is that we need to be the man in the middle, we either need to do the ARP poisoning, we need to start our own fake access point, or we need to do something to become the man in the middle.
In the next sections, ...