Chapter 3. Operating System-based Vulnerability Assessment and Exploitation
In this chapter, we will cover:
Exploit usage quick tips
Penetration testing on a Windows XP SP2 machine
Binding a shell to the target for remote access
Penetration testing on the Windows 2003 Server
Windows 7/Server 2008 R2 SMB client infinite loop
Exploiting a Linux (Ubuntu) machine
Understanding the Windows DLL injection flaws