Summary

In this chapter we covered various tools and techniques for getting access to our target system including cracking passwords, creating backdoors, exploiting services, and launching social engineering attacks.