Introduction
Having profited from some relatively easy to discover and exploit vulnerabilities, we will now move on to other issues that may require a little more effort from us as penetration testers.
In this chapter, we will search for exploits, compile programs, set up servers and crack passwords that will allow us to access sensitive information and execute privileged functions in servers and applications.