We covered coding and performed penetration tests in numerous environments in the earlier chapters; we are now ready to introduce client-side exploitation. Throughout this section and a couple more, we will learn client-side exploitation in detail.
Throughout this chapter, we will focus on the following:
- Attacking the target's browser
- Sophisticated attack vectors to trick the client
- Attacking Android and using Kali NetHunter
- Using Arduino for exploitation
- Injecting payloads into various files
Client-side exploitation sometimes requires the victim to interact with malicious files, which makes its success dependable on the interaction. These interactions could be visiting a malicious URL or downloading and executing a file, which means we need the help of the victims to exploit their systems successfully. Therefore, the dependency on the victim is...