Using Browser Exploitation to Take Over a Host’s Computer
CEH Exam Domain:
Domain 1: Background
Domain 2: Analysis/Assessments
Domain 4: Tools/Systems/Programs
CEH Objective Mapping:
Objective 1.2 Information Security Threats and Attack Vectors
Objective 1.3 Information Security Technologies
Objective 2.2 Information Security Assessment Practices
Objective 4.3 Information Security Tools
Overview
In this lab, you will exploit a browser to take over a host’s computer. In ethical hacking and penetration testing, white hat hackers use vulnerabilities in systems to test defenses and report on those weaknesses to a client. Black hat hackers use vulnerabilities to cause harm to an organization’s systems and network. The main reason for hackers to attack machines and networks is for financial gain. In this lab, you will use an Internet Explorer vulnerability to take over a victim’s machine.
outcomes:
In this lab, you will learn to:
- Use Metasploit to exploit a web browser vulnerability.
- Use spear phishing to trick a user into launching a web browser vulnerability.
- Breach a host's computer using the web browser vulnerability.