Penetrating the System - jude-lindale/Wiki GitHub Wiki
You can use identified security vulnerabilities to do the following:
- Gain further information about the host and its data.
- Obtain a remote command prompt.
- Start or stop certain services or applications.
- Access other systems.
- Disable logging or other security controls.
- Capture screen shots.
- Access sensitive files.
- Send an email as the administrator.
- Perform SQL injection.
- Launch a denial of service attack.
- Upload a file or create a backdoor user account proving the exploitation of a vulnerability.