Internet Explorer unsafe scripting misconfiguration vulnerability
Let us start with the first browser-based client side exploit. The elementary process of using any client-side exploit module is similar to the ones we discussed in previous chapters. The only difference lies in transferring the exploit to the target. Unlike operating system-based exploits, client-side exploits require manual execution of the exploit and payload at the target machine. You will understand it clearly, once we proceed with the recipe. So let us quickly dive into implementing the attack.
Getting ready
We will start with launching our msfconsole and selecting the relevant exploit. The process is similar to what we have been discussing so far in previous chapters. Then, ...
Get Metasploit Penetration Testing Cookbook now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.