Gaining remote access

So far in this book, we have seen various techniques and tools that could be used to gather information about the target and enumerate services running on the system. We also glanced at the vulnerability assessment process using OpenVAS. Having followed these phases, we should now have sufficient information about our target in order to actually compromise the system and gain access.

Gaining access to a remote system can be achieved in either of the two possible ways as follows: