Chapter 3. Exploitation Tools (Pwnage)
We begin with the fun stuff in this chapter: pwnage! For those who do not know, pwn is how a hacker would say "own." If you have been pwned, your systems have been "owned." When you fully compromise a server, you own it. Exploitation is the process of owning or compromising the machine. Thus far, we have gathered information on our target by gathering public information on the target and scanning the target network for vulnerabilities. We are now ready for the attack.
"Yes, I have just pwned your Windows server in under 3 minutes."
We will learn the following in this chapter, in order to mount an attack:
- Using the Metasploit Framework to exploit Windows operating systems
- Using advanced footprinting beyond mere vulnerability scanning
- Exploiting a segmented network using the pivot