官术网_书友最值得收藏!

The attack phase

The attack phase can be a bit challenging for a penetration tester. In this phase, exploiting a vulnerability is done to gain access to the target system and/or network. Sometimes, an exploit may not work and this can be a bit frustrating. Having an exploit-development environment is useful for a situation where a particular payload does not compromise a target. However, a penetration tester should not only rely on a single point of entry into a target but rather have multiple methods of gaining access. This concept not only demonstrates the technical skillset of the penetration tester but the many flaws within the target itself.

The information gathered about the target during the pre-attack phase will be utilized to determine the type of exploit to use on the target. Acquiring the target can be done using existing exploits found from reputable online repositories such as Exploit Database by Offensive Security (www.exploit-db.com) or using an exploitation development framework such as Metasploit (https://www.rapid7.com/products/metasploit/). 

Usually an attacker will compromise a standard account on a target system to minimize detection, then they will attempt to escalate privileges to either a system/administration or root privileges. During this phase, the penetration tester implants malicious code within the compromised systems to create backdoors for remote access and begins lateral movement on the network to compromise other potential targets.

主站蜘蛛池模板: 建德市| 河北区| 班戈县| 庆云县| 新竹县| 牡丹江市| 蒲城县| 通渭县| 乐陵市| 仲巴县| 神农架林区| 桑植县| 乌鲁木齐县| 沅陵县| 五家渠市| 嘉祥县| 海阳市| 连山| 汉寿县| 元江| 牙克石市| 青川县| 青铜峡市| 江永县| 阿克苏市| 健康| 临邑县| 屏边| 洛川县| 府谷县| 门源| 阳高县| 乌鲁木齐县| 岫岩| 道孚县| 呼伦贝尔市| 甘谷县| 区。| 莫力| 资中县| 浑源县|