From the course: Penetration Testing Essential Training

Unlock this course with a free trial

Join today to access over 25,300 courses taught by industry experts.

Exploit a target

Exploit a target

- [Instructor] We earlier covered the cyber kill chain and discussed the seven stages of a cyber attack. Let's take a look in more detail at the delivery and exploitation phases. These are the phases in which a pen tester spends most of their time. At the delivery phase, the objective is to find a way to deliver a payload to a target. There are four common ways to do that. The first is to send someone the payload as an attachment to an email and have them execute it. This could be a malicious executable file, or more usually a document with malicious code installed in it. Regardless, the delivery mechanism is the same. Another way of delivering a malware payload to a target is to have the target come and get it by sending them an email containing a hyperlink to a malicious website. This may be a website which when the user visits it can automatically drop the malware into their system. It may be a site which contains trojanized software containing malicious code hidden inside the…

Contents