-
Book Overview & Buying
-
Table Of Contents
Penetration Testing with BackBox
By :
In the previous chapters, we performed and learned how to gather information and also a case of vulnerability assessment/scan on target system. Now, in this chapter, we will try to use the information we found in the previous steps and go in further to the next one, exploitation.
Let's define exploitation. It means to use the vulnerabilities that we found earlier in the target system and manipulate them to achieve a goal to ascertain whether the system is seriously affected by the vulnerability.
An exploit is a piece of data or sequence of commands that takes advantage of a bug or vulnerability and uses this weakness to cause unintended or unanticipated behavior, which is different from the way the data was originally designed.
In this chapter, we perform exploitation on two different vulnerabilities found: a SQL injection and a web application exploitation.
Change the font size
Change margin width
Change background colour