Other attack vectors and strategies

Sometimes, you can't use the previous mentionned attacks for a reason or another, this doesn't mean that it's all played and you should go back home. There are other strategies you can & should use such as :

  • Run scans using Nessus or so for example to discover what's available in the network and maybe discover some vulnerable components

  • For a faster result, look for available websites using http_version for example and try to find maybe vulnerable websites that let's you RCE

  • Look for default on web logins such as :

    • printers

    • jenkins

    • camera systems

    • etc

  • Finally, think outside the box, depending on the env you're in, you might find some more interesting sutff.

With this we end our initial attack vector section.

Last updated