We are now moving toward the next segment of the book, where we will be covering topics related to gaining access to computer devices. In this part, we will be looking at ways to gain access to a victim's machine. We will be hacking victims' systems using various techniques. This chapter will cover the first approach to attacking the victim's system: the server-side attack. We will perform a server-side attack using the Metasploit device and also exploitation of backdoors.
This chapter has the following sections:
- Introduction to gaining access
- Server-side attacks
- Server-side basics
- Server-side attacks, Metasploit basics
- Code execution Metasploit