In this chapter, we examined attacks against systems that are generally isolated from protected networks. These client-side attacks focus on the vulnerabilities in specific applications. We learned how to create a backdoor in any executable and also reviewed hostile scripts, especially VBScript and PowerShell, which are particularly useful in testing and compromising Windows-based networks. We then examined XSSF for new versions of Metasploit in Kali, which can compromise XSS vulnerabilities. We also examined the BeEF tool, which targets the vulnerabilities in a web browser. Both XSSF and BeEF integrate with reconnaissance, exploitation, and post exploitation tools on Kali to provide comprehensive attack platforms.
In the next chapter, we will focus more on how to bypass Network Access Control (NAC) and antivirus software, User Account Control (UAC), and Windows operation...