In this article, I want to talk about gaining access to a machine. This is the phase, after reconnaissance and scanning (https://steemit.com/hack/@pierlave/learn-hacking-2-00-reconnaissance). This phase is about exploiting a vulnerability that you found with the information you gathered in the phases before.
It's important to remember that not every vulnerability will give you full access to a system. If you found multiple vulnerabilities, it's more efficient to use the one that gives you more control over the target!
There are a lot of tools to exploit many types of vulnerabilities. Here are some of my favorites!
Metasploit (good to exploit machines) https://www.metasploit.com/
Sqlmap (good for SQL injections, database) http://sqlmap.org/
Social Engineer Toolkit (cloning a website for exemple) https://github.com/trustedsec/social-engineer-toolkit
BeEF (browser exploitation) http://beefproject.com/
Depending on your target, you will choose the right tool for the job.
You can take a look at this article to see what gaining access of a machine can look like.
In the next article, I will show you how to exfiltrate data. If you want more information fell free to ask!
The information provided on hacking is to be used for educational purpose only. The creator is in no way responsible for any misuse of the information provided. All the information provided is meant to help the reader develop a hacker defense attitude in order to prevent the attacks discussed. In no way should you use the information to cause any kind of damage directly or indirectly. The word "Hacking" should be regarded as "Ethical hacking". You implement the information given at your own risk