Offensive Security

System Hacking & Exploitation

Gaining access to a system using exploits.

Operational Phase

01

Reconnaissance Phase

Finding the target info needed for an exploit.

02

Exploit Selection

Choosing the right exploit for the version.

03

Payload Delivery

Staged vs Non-staged payloads (Meterpreter).

04

Post-Exploitation

Looting data and traversing the system.