Phase 4: Exploitation
- Vulnerability Assessment
Looking for low hanging fruits:
- Misconfigured servers
- Unimplemented or badly implemented ACL's
- Default or weak passwords (easily guessable)
- Open SMB shares/ Null sessions
- Broadcast Requests
- Vulnerabilities related to public exploits
Tools:
- OpenVAS
- Nessus
- Nexpose
- Metasploit