Exploiting Targets

  • Sanjib Sinha


The exploit phase of Kali Linux focuses on one key aspect: creating access to a target. In previous chapters, you learned how to identify the exploitable security flaws. There are a few good open source penetration testing tools that can easily automate the process of detecting and exploiting many security flaws to take over the target system. In this chapter, you will see how they work.

Copyright information

© Sanjib Sinha 2018

Authors and Affiliations

  • Sanjib Sinha
    • 1
  1. 1.HowrahIndia

Personalised recommendations