Summary
This chapter explained a hands-on approach to client-based exploitation. Learning client-based exploitation will ease a penetration tester into performing internal audits, or into a situation where internal attacks can be more impactful than external ones.
In this chapter, we looked at a variety of techniques that can help us to attack client-based systems. We looked at browser-based exploitation and its variants. We exploited Windows-based systems using Arduino. We learned how to create various file format-based exploits. Lastly, we also learned how to exploit Android devices.
In the next chapter, we will look at post-exploitation in detail. We will cover some advanced post-exploitation modules, which will allow us to harvest tons of useful information from the target systems.