Internet Explorer unsafe scripting misconfiguration vulnerability

Let us start with the first browser-based client side exploit. The elementary process of using any client-side exploit module is similar to the ones we discussed in previous chapters. The only difference lies in transferring the exploit to the target. Unlike operating system-based exploits, client-side exploits require manual execution of the exploit and payload at the target machine. You will understand it clearly, once we proceed with the recipe. So let us quickly dive into implementing the attack.

Getting ready

We will start with launching our msfconsole and selecting the relevant exploit. The process is similar to what we have been discussing so far in previous chapters. Then, ...

Get Metasploit Penetration Testing Cookbook now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.