<aside>
๐ Exploiting a computer system involves identifying and utilizing vulnerabilities in the software or hardware to gain unauthorized access or control over the system. Majority of identifying vulnerabilites in Kioptrix have been done so already and can be referenced here ๐
</aside>
Table of contents
<aside>
๐ Reminders
- Most of these notes are in junction with Kioptrix
- Not all of this is step-by-step with PNPT - Different versions of Kali
- Post exploitation is not mentioned here, but being able to show route, arp, or IPโs in rooted machines is some basic post reporting
</aside>
Reverse Shells vs Bind Shells
๐ R3verse Shell
๐ซ Bind Shell
Staged vs Non-Staged Payloads
Payload - Data used to exploit or gain the shell of a machine.
๐๏ธNon-staged
๐๏ธ Staged
Gaining Root with Metasploit
โ๏ธMetasploiting Kioptrix w/ Reverse Shell
Manual Exploitation
๐ผ OpenLuck
Brute Force Attacks
๐ฎ Hydra