In this chapter, we learned about developing custom exploits to exploit web and network services. We also discussed how we can evade our exploit from antivirus software. Furthermore, we explored various web vulnerabilities, such as LFI and RFI, and talked about how these can be elevated to get a reverse shell from the victim. It's important to understand that exploit development requires a good understanding of the underlying vulnerability, and we should always try to make generic exploits that are reusable. Feel free to modify the exploit codes we discussed to make them generic and try them out with other applications.
In the next chapter, we will step out of the penetration-testing ecosystem and understand a little more about the Security operations center (SOC), or the monitoring ecosystem of cyber security. We will understand what cyber threat intelligence is...