Chapter 5. Taking Action - Intrude and Exploit
Now that we have found our way into the target environment and begun to collect information in Chapter 4, Explore the Target - Recon and Weaponize we'll certainly have some attack vectors to try as we progress further along the Penetration Testing Kill Chain. Preparation in the Recon and Weaponize phases provides us with a detailed footprint of the environment, its users, and the applications running within the network. In Sun Tzu's book The Art of War , he wisely states:
"So in war, the way is to avoid what is strong, and strike at what is weak."
More often than not, our targets will all but announce their weaknesses to us in recon activities. These soft points are what we need to now probe and ...
Get Penetration Testing with Raspberry Pi - Second Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.