Other attack vectors and strategies
Sometimes, you can't use the previous mentionned attacks for a reason or another, this doesn't mean that it's all played and you should go back home. There are other strategies you can & should use such as :
Run scans using Nessus or so for example to discover what's available in the network and maybe discover some vulnerable components
For a faster result, look for available websites using http_version for example and try to find maybe vulnerable websites that let's you RCE
Look for default on web logins such as :
printers
jenkins
camera systems
etc
Finally, think outside the box, depending on the env you're in, you might find some more interesting sutff.
With this we end our initial attack vector section.
Last updated