Ethical Hacking and Penetration Testing Guide



Yüklə 22,44 Mb.
Pdf görüntüsü
səhifə143/235
tarix07.08.2023
ölçüsü22,44 Mb.
#138846
1   ...   139   140   141   142   143   144   145   146   ...   235
Ethical Hacking and Penetration Testing Guide ( PDFDrive )

Teensy USB
Teensy USB is a device that has the capability to emulate mouse and keyboard. It can help you 
bypass the autorun.inf protection, which means that you will be able to execute a code on the 
victim’s computer even if autorun.inf is disabled. With social engineering toolkit we can set up 
a WSCRIPT file which will download our payload and execute it as the device would emulate 
itself as a keyboard you can easily bypass the autorun.inf protections since your computer would 
recognize it as a Keyboard not a CD/USB or DVD. Teensy USB costs about $20, and it’s worth 
every penny.
Conclusion
In client side exploitation, we take advantage of the weakest link, that is, clients. Our major targets 
are client side software like web browsers, media players, and e-mail applications. The vulner-
abilities in these software are published often, and clients usually do not update necessary patches 
frequently.
Another advantage we discussed is that it can help us exploit systems that are not directly 
accessible from the outside due to NAT, firewall, etc. We discussed various methods to launch 
client side exploits. We even talked about some advance attack vectors such as those used to com-
promise client side updates.
Further Reading
The SET’s official documentation has a great resource explaining how this attack could be 
launched. You can check it out at
http://www.social-engineer.org/framework/Computer_Based_Social_Engineering_Tools:_
Social_Engineer_Toolkit_(SET)#Infectious_Media_Generator.



231
Chapter 9
Postexploitation
So we have successfully exploited the target and managed to gain access to it. Now we are into the 
postexploitation phase, which is the last phase of our penetration testing process. In this phase, we 
will learn to exploit our targets further, escalating privileges and penetrating the internal network 
even more. Meterpreter, which is the heart of this chapter, makes the postexploitation process 
much easier.
Meterpreter contains many built-in scripts written in ruby; we can also add and modify meter-
preter scripts based on our requirements or just for exploration. 
The goals of this chapter are as follows:
Gaining situation awareness in Windows/Linux after target compromise
Using Meterpreter scripts to perform reconnaissance
Using various methods for escalating privileges
Maintaining access
Penetrating the internal network further

Yüklə 22,44 Mb.

Dostları ilə paylaş:
1   ...   139   140   141   142   143   144   145   146   ...   235




Verilənlər bazası müəlliflik hüququ ilə müdafiə olunur ©azkurs.org 2024
rəhbərliyinə müraciət

gir | qeydiyyatdan keç
    Ana səhifə


yükləyin