So far, we've seen really good methods in client-side attacks. These methods were good because we didn't really need to ask the client to do anything. We would gain access to the target computer if the client updated their system, or, if they downloaded something, then we'd backdoor it on the fly. These methods are really good because we don't actually need to do something, so the target has to do an action, but we don't need to ask them to do something. The only problem with these methods is that we need to be the man in the middle, we either need to do the ARP poisoning, we need to start our own fake access point, or we need to do something to become the man in the middle.
In the next sections, we're going to talk about a method we can use if we aren't the man in the middle, if the person exists...