Summary
In this chapter, we covered a few options to exploit services so that we can gain access to environments. We started by explaining social engineering and phishing techniques. Then, we worked through the various tools that can be used for IP address sniffing and spoofing, as well as code-based, password cracking, web apps, and cloud services exploitations.
In the next chapter, we will talk about how to maintain and retain access to an environment.