Counter Hack Reloaded: A Step-By-Step Guide to Computer Attacks and Effective Defenses by Ed Skoudis; Tom Liston

Counter Hack Reloaded: A Step-By-Step Guide to Computer Attacks and Effective Defenses by Ed Skoudis; Tom Liston

Author:Ed Skoudis; Tom Liston
Language: eng
Format: mobi
Tags: Networking, Computer networks, Computers, Computer networks - Security measures, Data protection, General, Internet, Security, Security measures
ISBN: 9780131481046
Publisher: Upper Saddle River, NJ : Prentice Hall Professional Technical Reference, c2006.
Published: 2006-01-02T05:00:00+00:00


Next, Metasploit offers a huge set of payloads, that is, the code the attacker wants to run on the target machine, triggered by the exploit itself. An attacker using Metasploit can choose from any of the following payloads to foist on a target:

This payload opens a command shell listener on the target machine using the existing TCP connection of a service on the machine. The attacker can then feed commands to the victim system across the network to execute at a command prompt.

This payload opens a command shell listener on any TCP port of the attacker's choosing on the target system.



Download



Copyright Disclaimer:
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.