Chapter 7. Sophisticated Client-side Attacks
Covering the coding part of the Metasploit framework and the penetration testing numerous environments, we are now set to introduce client-side exploitation. Throughout this and a couple of more chapters, we will detail client-side exploitation. Let's check what we have in store in this chapter. We will focus on client-based exploitation with Metasploit, which will be covered through the following key points:
Attacking the victim's browsers
Sophisticated attack vectors to trick the client
Attacking web servers
Bypassing antivirus detections
Attacking Linux with malicious packages
Injecting payloads into various files
Client-based exploitation requires some help from the client in order to execute properly. Help can be in the form of visiting a malicious URL, opening and executing a file, and so on. This means we need the help of the victims to exploit their system successfully. Therefore, the dependency on the victim is a critical factor in client-side...