Summary
This chapter explained various methods to compromise vulnerable web servers using tools available in Kali. The most common methods are identifying known vulnerabilities with automated tools and exploiting the best possible path to gaining access to the target system.
The chapter started off focusing on various tools used to identify vulnerabilities. The next topic covered was tools used to exploit vulnerabilities found on common servers as well as servers hosting e-mail services. Next, we focused on brute-forcing tools that could access data from systems that are not vulnerable to known exploits. We concluded touching upon password cracking and man-in-the-middle attacks; however, these subjects have dedicated sections in later chapters.
The next chapter will focus on identifying and exploiting vulnerabilities found on host systems, also known as client devices.