Summary

This chapter focused on client-side attacks. First, we installed a tool called Veil, which we use to exploit backdoors, through which we can gain access to a user's system. We then looked at payloads, before generating our own and testing it against antivirus programs. We also learned how to create a backdoor Meterpreter that was used to control a target computer without being detected by antivirus software. We concluded by looking at delivery methods, as well as how to protect systems from such attacks.The next chapter we are going to focus on using the social engineering to launch attacks on the client

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.133.130.136