O'Reilly logo

Metasploit Penetration Testing Cookbook by Abhinav Singh

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Internet Explorer unsafe scripting misconfiguration vulnerability

Let us start with the first browser-based client side exploit. The elementary process of using any client-side exploit module is similar to the ones we discussed in previous chapters. The only difference lies in transferring the exploit to the target. Unlike operating system-based exploits, client-side exploits require manual execution of the exploit and payload at the target machine. You will understand it clearly, once we proceed with the recipe. So let us quickly dive into implementing the attack.

Getting ready

We will start with launching our msfconsole and selecting the relevant exploit. The process is similar to what we have been discussing so far in previous chapters. Then, ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required