Chapter 4. Remote Exploitation
We have gathered our data, reviewed the information and chosen a few possible targets for the next stage in our penetration test. Now it is time to go the extra mile and prove that the vulnerabilities found have a potential to impact the bottom line. After all, this is what your clients need to know and understand about their environment. In this chapter, we will quickly review the basics of exploitation and then move on to the more interesting techniques and methods that will let us understand the true security posture of the network environment we are testing. Items of interest discussed in this chapter include the following:
Adding a vulnerable machine to our sandboxed virtual network enables you to follow along with the examples presented in the book
Compiling and/or rewriting proof of concept exploit code found on the Internet
Manually exploiting a remote vulnerability using publically available exploit code
Transferring files to and from the victim machine...