Summary and exercises

This chapter explained a hands-on approach to client-based exploitation. Learning client-based exploitation will ease a penetration tester into internal audits, or into a situation where internal attacks can be more impactful than external ones.

In this chapter, we looked at a variety of techniques that can help us attack client-based systems. We looked at browser-based exploitation and its variants. We exploited Windows-based systems using Arduino. We learned how we could create various file format-based exploits, and how to use Metasploit with DNS-spoofing attack vectors. Lastly, we also learned how to exploit Android devices.

You can feel free to perform the following exercises in order to enhance your skills:

In the next chapter, we will look at post-exploitation in detail. We will cover some advance post-exploitation modules which will allow us to harvest tons of useful information from the target systems.