From the course: Penetration Testing Essential Training
Unlock this course with a free trial
Join today to access over 25,300 courses taught by industry experts.
Exploit a target - Linux Tutorial
From the course: Penetration Testing Essential Training
Exploit a target
- [Instructor] We earlier covered the cyber kill chain and discussed the seven stages of a cyber attack. Let's take a look in more detail at the delivery and exploitation phases. These are the phases in which a pen tester spends most of their time. At the delivery phase, the objective is to find a way to deliver a payload to a target. There are four common ways to do that. The first is to send someone the payload as an attachment to an email and have them execute it. This could be a malicious executable file, or more usually a document with malicious code installed in it. Regardless, the delivery mechanism is the same. Another way of delivering a malware payload to a target is to have the target come and get it by sending them an email containing a hyperlink to a malicious website. This may be a website which when the user visits it can automatically drop the malware into their system. It may be a site which contains trojanized software containing malicious code hidden inside the…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.