This chapter explained a hands-on approach to client-based exploitation. Learning client-based exploitation will ease a penetration tester into internal audits, or into a situation where internal attacks can be more impactful than external ones.
In this chapter, we looked at a variety of techniques that can help us attack client-based systems. We looked at browser-based exploitation and its variants. We exploited Windows-based systems using Arduino. We learned how we could create various file format-based exploits, and how to use Metasploit with DNS-spoofing attack vectors. Lastly, we also learned how to exploit Android devices.
You can feel free to perform the following exercises in order to enhance your skills:
- Try performing the DNS spoofing exercise with BetterCAP
- Generating PDF and Word exploit documents from Metasploit and try evading signature detection...