<aside> ๐Ÿ‘‰ Exploiting a computer system involves identifying and utilizing vulnerabilities in the software or hardware to gain unauthorized access or control over the system. Majority of identifying vulnerabilites in Kioptrix have been done so already and can be referenced here ๐Ÿ‘‰

</aside>

Table of contents

<aside> ๐Ÿ“Œ Reminders

Reverse Shells vs Bind Shells


๐Ÿš R3verse Shell

๐Ÿซ” Bind Shell

Staged vs Non-Staged Payloads


Payload - Data used to exploit or gain the shell of a machine.

๐Ÿ—๏ธNon-staged

๐Ÿ—๏ธ Staged

Gaining Root with Metasploit


โš™๏ธMetasploiting Kioptrix w/ Reverse Shell

Manual Exploitation


๐Ÿ’ผ OpenLuck

Brute Force Attacks


๐Ÿ“ฎ Hydra