We have learned that to get inside the most secure networks, client-side attacks are considered to be the easiest method. An attacker can take greater advantage of the unsecured application developed by the developer as it is very difficult for the application developer to look for all the software flaws in the given timeline. Hence, because of the time constraint, many vulnerabilities go undiscovered during testing.
In this chapter, we covered how to create a listener and payload that can be used to bypass the AV security of a target machine. We also learned how to perform an E-bomb attack and send spoofed SMSes. In this chapter, we also discussed the different attacks, which can help us to check the security of any organization based on their e-mail platform and application level, such as attacking the web browser or cell phones.