In this chapter, we examined how to exploit common remote access applications, including the ones that have been encrypted to provide additional security. We exploited operating system communication protocols (RDP and SSH). We also learned how to conduct reconnaissance of SSL/TLS connections and virtual private networks and attack types that reduce the effectiveness of encryption.
In the next chapter, we will see the result of combining attacks against specific communication channels with attacks against human beings. In examining the effectiveness of these client-side exploits, we will review several types of attack as well as the Browser Exploitation Framework (BeEF) project and backdooring executable files.