Penetration testing and ethical hacking is an exciting topic. Everyone is always excited to hack another system, whether it's a computer or even a wireless network. The previous chapters focused on gathering enough intelligence on a target prior to launching an attack. The exploitation phase of hacking and penetration testing can sometimes be challenging.
It's very important to gather as many details as possible about the target. Such background work helps us to determine approximate exploits and a payload we can launch against a target system or network. Sometimes, when you launch an exploit that's intended for a particular operating system, it may not work, and this can be frustrating. One tactic you can adopt is to target the low-hanging fruits on a network—that is, attempt to exploit and gain access to systems and devices that seem easier...