December 2017
Intermediate to advanced
860 pages
16h 1m
English
We covered coding and performed penetration tests on numerous environments in the earlier chapters; we are now ready to introduce client-side exploitation. Throughout this and a couple of more chapters, we will learn about client-side exploitation in detail.
Throughout this chapter, we will focus on the following topics:
Client-side exploitation sometimes require the victim to interact with the malicious files, ...
Read now
Unlock full access