ABSTRACT

This chapter explores the remote exploitation and focuses on the server side exploitation. It discusses the network protocols, network remote services, reconnaissance with metasploit, and explores local/remote target with metasploit. The chapter presents the network protocols: transmission control protocol, user datagram protocol, and internet control messaging protocol. All server protocols are divided into two basic categories: text-based protocols and binary protocols. Binary protocols are not human readable and are very difficult to understand; they are designed for efficiency across the wire. The best way to learn is by reading the Request for Comment of each protocol, which is an official documentation for the book. It contains ins and outs of every protocol. The Simple Mail Transfer Protocol is mostly used for sending e-mails. File Transfer Protocol (FTP) is commonly used for uploading/downloading files from a server. There are some FTP servers that allow anonymous log-ins and are often not updated/patched, making it easier for an attacker to compromise them.