Gaining remote access
So far in this book, we have seen various techniques and tools that could be used to gather information about the target and enumerate services running on the system. We also glanced at the vulnerability assessment process using OpenVAS. Having followed these phases, we should now have sufficient information about our target in order to actually compromise the system and gain access.
Gaining access to a remote system can be achieved in either of the two possible ways as follows:
- Direct access
- Target behind the router
Direct access
In this type, the attacker has direct access to the target system. The attacker essentially knows the IP address of the target system and connects to it remotely. The attacker then exploits an existing vulnerability on the target system which gives further access.
Target behind router
In this scenario, the target machine is behind a router or a firewall with Network Address Translation (NAT) enabled. The target system has private IP address and...