July 2018
Beginner
564 pages
12h 22m
English
We are now moving toward the next segment of the book, where we will be covering topics related to gaining access to computer devices. In this part, we will be looking at ways to gain access to a victim's machine. We will be hacking victims' systems using various techniques. This chapter will cover the first approach to attacking the victim's system: the server-side attack. We will perform a server-side attack using the Metasploit device and also exploitation of backdoors.
This chapter has the following sections: