Ethical Hacking and Penetration Testing Guide



Yüklə 22,44 Mb.
Pdf görüntüsü
səhifə102/235
tarix07.08.2023
ölçüsü22,44 Mb.
#138846
1   ...   98   99   100   101   102   103   104   105   ...   235
Ethical Hacking and Penetration Testing Guide ( PDFDrive )

Command
:
ipconfig/release
Next in order to trigger the attack, on the victim machine we would request for a new IP address.
Command
:
ipconfig/renew
Once the victim renews the IP address our attack would be successfully triggered. Now the 
attacker can easily capture the victim’s traffic. You can use your favorite packet analyzer to do it 
as shown before in this chapter.
Conclusion
In this chapter, we have discussed the difference between sniffing on a hub-based network and a 
switch-based network. We talked about various types of man in the middle attacks and various 
tools that can be utilized to perform this attack. We also saw how an attacker can cause a denial 
of service on a network by using MITM attacks. Finally, we discussed about sniffing SSL traffic
which is a bit harder and requires more resources.



163
Chapter 7
Remote Exploitation
Finally, we’ve come to the exploitation chapter. We can now use the knowledge acquired so far 
to gain access to the target machine. Exploitation can be both server side and client side. Server 
side exploitation consists in having a direct contact with the server, and it does not involve any 
user interaction. Client side exploitation, on the other hand, is where you directly engage with the 
target in order to exploit it.
Server side exploitation will be the focus of this chapter. We’ll see client side exploitation in the 
next chapter. The main goal of this chapter is to familiarize the audience with the methodologies 
that can be used to hack into a target. The following topics will be covered:
Understanding the network protocols
Attacking network remote services
Introduction to Metasploit
Reconnaissance with Metasploit
Exploiting the local/remote target with Metasploit
Introducing to Armitage
Exploiting local/remote target with Metasploit

Yüklə 22,44 Mb.

Dostları ilə paylaş:
1   ...   98   99   100   101   102   103   104   105   ...   235




Verilənlər bazası müəlliflik hüququ ilə müdafiə olunur ©azkurs.org 2024
rəhbərliyinə müraciət

gir | qeydiyyatdan keç
    Ana səhifə


yükləyin