Abstract
The exploit phase of Kali Linux focuses on one key aspect: creating access to a target. In previous chapters, you learned how to identify the exploitable security flaws. There are a few good open source penetration testing tools that can easily automate the process of detecting and exploiting many security flaws to take over the target system. In this chapter, you will see how they work.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2018 Sanjib Sinha
About this chapter
Cite this chapter
Sinha, S. (2018). Exploiting Targets. In: Beginning Ethical Hacking with Kali Linux. Apress, Berkeley, CA. https://doi.org/10.1007/978-1-4842-3891-2_15
Download citation
DOI: https://doi.org/10.1007/978-1-4842-3891-2_15
Published:
Publisher Name: Apress, Berkeley, CA
Print ISBN: 978-1-4842-3890-5
Online ISBN: 978-1-4842-3891-2
eBook Packages: Professional and Applied ComputingProfessional and Applied Computing (R0)Apress Access Books