Summary
In this chapter, we took a deep dive into systematic processes for overcoming security controls set by the organizations as part of their internal protection. We focused on different types of Network Access Control bypass mechanisms, how to establish connection to the external world using tunneling, bypassing the firewalls and also learned on every level of network, application, and operating system controls, to ensure that our exploits can successfully reach the target system. Additionally, we have reviewed how to bypass antivirus detection by utilizing veil-evasion and Shellter tools. We also saw how different Windows operating system security controls such as EMET, UAC, application whitelisting, and other active directory specific controls put in place, can easily be circumvented using the Metasploit framework.
In the next chapter, we will examine various means of exploiting systems, including both public exploits, exploit frameworks such as the Metasploit framework, and craft...