Gaining remote access

So far in this book, we have seen various techniques and tools that could be used to gather information about the target and enumerate services running on the system. We also glanced at the vulnerability assessment process using OpenVAS. Having followed these phases, we should now have sufficient information about our target in order to actually compromise the system and gain access.

Gaining access to a remote system can be achieved in either of the two possible ways as follows:

  • Direct access
  • Target behind the router

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
18.119.253.93