Skip to Content
Metasploit
book

Metasploit

by David Kennedy, Jim O'Gorman, Devon Kearns, Mati Aharoni
July 2011
Intermediate to advanced content levelIntermediate to advanced
328 pages
9h 1m
English
No Starch Press
Content preview from Metasploit

Chapter 8. Exploitation Using Client-Side Attacks

Years of focus on defensive network perimeters have drastically shrunk the traditional attack surfaces. When one avenue of attack becomes too difficult to penetrate, attackers can find new and easier methods for attacking their targets. Client-side attacks were the next evolution of attacks after network defenses became more prominent. These attacks target software commonly installed on computers in such programs as web browsers, PDF readers, and Microsoft Office applications. Because these programs are commonly installed on computers out of the box, they are obvious attack vectors for hackers. It’s also common for these applications to be out of date on users’ machines because of irregular patching ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Rootkits and Bootkits

Rootkits and Bootkits

Alex Matrosov, Eugene Rodionov, Sergey Bratus
The Complete Metasploit Guide

The Complete Metasploit Guide

Sagar Rahalkar, Nipun Jaswal

Publisher Resources

ISBN: 9781593272883Errata Page