[[Security Concepts]]
Overview
- This is the phase after you have successfully acquired
vulnerabilities.
Types of Exploitation
- Remote
- Remote exploits that work when sent over a network
- Mostly used to gain initial access
- Client or Local exploit
- Direct engagement with target
- Malicious Email attachments
- Malware on a USB
- Mostly used for privilege escalation