The exploitation phase of the kill chain is the most dangerous for penetration testers or attackers – they directly interact with the target network or system and there is a great chance of their activity being logged or their identity being discovered. Again, stealth must be employed to minimize the risks involved. Although no specific methodology or tool is undetectable, there are some configuration changes and specific tools that will make detection more difficult.
When considering remote exploits, most networks and systems employ various types of defensive controls to minimize the risk of attack. Network devices include routers, firewalls, intrusion detection and prevention systems, and malware detection software.
To facilitate exploitation, most frameworks incorporate features to make attacks somewhat stealthy. The Metasploit...