Ethical Hacking and Penetration Testing Guide



Yüklə 22,44 Mb.
Pdf görüntüsü
səhifə132/235
tarix07.08.2023
ölçüsü22,44 Mb.
#138846
1   ...   128   129   130   131   132   133   134   135   ...   235
Ethical Hacking and Penetration Testing Guide ( PDFDrive )

Fileformat Exploits
Fileformat exploits are one of the most efficient and most common PDF exploits used by penetra-
tion testers. Fileformat exploits enable you to create a malicious PDF file, which once executed 
by the victim will give the shell to the attacker. Using exploits present in Metasploit, once you 
infect a single file on the victim’s computer, it’s possible for you to infect all other PDF files on 
that computer.
Browser Exploits
Browser exploits are not used much by pentesters. However, they can prove beneficial in some 
situations. Here is how PDF browser exploit works:
1. The attacker chooses a browser PDF exploit module.
2. The browser PDF exploits take advantage of the built-in webserver from Metasploit.


Client Side Exploitation
◾ 
209
3. Once the webserver is set up and the PDF exploits are loaded onto it, the URL is sent to the 
victim via social engineering.
4. Once the victim clicks on the URL, the PDF exploit is injected and does the rest of the work 
for you.
Scenario from Real World
The purpose of the book is not only to teach you to work with the tools but to familiarize you with 
a proper penetration testing methodology. Tools keep changing, but the methodology remains 
the same.
So imagine a real-world scenario where you are pentesting against a company ABC. By using 
some information-gathering techniques you learned in the previous chapter, you find out that the 
e-mail address of the CEO is steven@abc.com.
By using a fake mailer, you e-mail the following message to Steven from the e-mail address of 
the company’s IT department head, say, Rolph.


210
◾ 
Ethical Hacking and Penetration Testing Guide
Hi Steven,
We would like to inform you about a critical update for all Windows users. We recommend you read 
the attached PDF document and follow the step-by-step instructions mentioned in the document to 
update your system
.
Warm regards
,
Rolph | ABC.com
ABC IT DEPT
The CEO will think that the e-mail is legitimate and is really from the IT department, so he will 
open the PDF document without hesitation, thereby enabling the attacker to take full control of 
his computer.

Yüklə 22,44 Mb.

Dostları ilə paylaş:
1   ...   128   129   130   131   132   133   134   135   ...   235




Verilənlər bazası müəlliflik hüququ ilə müdafiə olunur ©azkurs.org 2024
rəhbərliyinə müraciət

gir | qeydiyyatdan keç
    Ana səhifə


yükləyin