Book Image

Building Virtual Pentesting Labs for Advanced Penetration Testing

By : Kevin Cardwell
Book Image

Building Virtual Pentesting Labs for Advanced Penetration Testing

By: Kevin Cardwell

Overview of this book

Table of Contents (20 chapters)
Building Virtual Pentesting Labs for Advanced Penetration Testing
Credits
About the Author
About the Reviewers
www.PacktPub.com
Preface
Index

Summary


In this chapter, we discussed client-side attacks, and this continues to be the method of choice as vendors improve their security. We can still use the other methods we discussed throughout the book; as time passes, server-side attacks become less effective. However, as we said throughout, you have to test for all possibilities, and that is why we have a systematic process to follow. We started the chapter with looking at the concept of lure and bait with respect to getting a client to come to us.

Following the discussion of lure and bait, we looked at the pilfering of data, that is, what we can extract from the client once we have a shell. We used a number of enumeration tools that are available in metasploit to accomplish this.

Following this, we looked at the powerful technique of establishing a pivot point from a client, and then we carried out our attack against machines that we cannot access without the first compromised machine.

The next area we discussed was the different types...