System Hacking & Exploitation
Gaining access to a system using exploits.
Operational Phase
01
Reconnaissance Phase
Finding the target info needed for an exploit.
02
Exploit Selection
Choosing the right exploit for the version.
03
Payload Delivery
Staged vs Non-staged payloads (Meterpreter).
04
Post-Exploitation
Looting data and traversing the system.