Book Image

Building Virtual Pentesting Labs for Advanced Penetration Testing

By : Kevin Cardwell
Book Image

Building Virtual Pentesting Labs for Advanced Penetration Testing

By: Kevin Cardwell

Overview of this book

Table of Contents (20 chapters)
Building Virtual Pentesting Labs for Advanced Penetration Testing
Credits
About the Author
About the Reviewers
www.PacktPub.com
Preface
Index

Client-side attack methods


As we have already said, when it comes to a client, they do not just sit and wait for a connection from us; therefore, we have to trick them and get them to come to us. We have a number of ways to do this, and we will talk about two of them now.

Bait

When we deploy the bait technique, we set some form of bait and wait for a client to come and take the bait. This is a similar approach to fishing, that is, we try to put some type of bait out and entice a client to come to us. The problem with this approach is the same as the problem with fishing. We do not know whether the client will ever come to where we have the bait.

Lure

Using the lure concept, we are still trying to trick the client to come to us, but we don't just wait for them to come and take some form of bait. Instead, we send the client some form of communication and wait to see whether they are tricked into following our hook. We have three main methods in this scenario, and they are e-mail, web, and USB...