"For Attackers, it's all about getting convenient remote access to everything."
In Chapter 7, Reconnaissance and Exploitation of Web-Based Applications, we used the kill-chain methodology to attack web-based applications. We reviewed reconnaissance, vulnerability scanning, and exploitation methodologies that are particular to websites and other applications. We also reviewed the unique tools that are required for assessing web-based applications, especially client-side proxies and post exploitation tools such as web shells.
In this chapter, we'll focus on compromising remote access communication between devices and applications that have proliferated over the internet.
Attackers are taking advantage of the pervasiveness of these remote access communications to achieve the following goals:
- Exploit pre-existing communication channels...