O'Reilly logo

Learning Metasploit Exploitation and Development by Aditya Balapure

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 6. Client-side Exploitation

In the previous chapter we completed the vulnerability-scanning and information-gathering phase. In this chapter we will discuss various ways in which we may be able to compromise our victim (client). We will cover various techniques such as luring a victim to click on a URL or an icon, which ultimately gives us a reverse shell.

What are client-side attacks?

With our hands all dirty with some exploitation basics in the previous chapters, we now move on to client-side attacks. But to understand client-side attacks, we need to first have clear concepts about the client-server architecture, and differentiate the attacks between the two components. The server is the main computer that shares its resources over the ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required