Penetration Testing with Kali Linux
PWK - Copyright © 2023 OffSec Services Limited. All rights reserved.
28
2.3.4
Other Perimeter Attacks
It is relatively common to encounter various types of external-facing services on a penetration
test that are vulnerable to different kinds of attacks. However, as penetration testers we will rarely
have time to write our own exploits from scratch in the middle of an engagement.
Luckily, there are several ways in which we can benefit from the experience of the information
security community.
Locating Public Exploits
will portray several different means of working with
exploits that are
available on Kali Linux and
on the internet
.
12
Then,
Fixing Exploits
will help us
adapt these exploits to suit our specific needs.
We then explore the very surface of a very exciting subject:
Anti Virus Evasion
. While
Anti Virus
(AV) evasion isn’t
itself a perimeter attack, having some knowledge of how to avoid AV will be
helpful since most modern day enterprises do deploy AV solutions.
Finally, we complete our review of perimeter attacks with an analysis of cryptography and
Password Attacks
. Weak or predictable passwords are extremely common in most organizations.
This Module covers how to attack network services and how to obtain and crack various kinds of
credentials.
2.3.5
Privilege Escalation and Lateral Movement
Once we obtain access to a machine, we suddenly have a whole set of new actions and activities
open to us. We may want to increase our
privileges
13
on the machines so that we can fully control
it, or we might want to use it to gain access to other machines on the network.
Yüklə
Dostları ilə paylaş: