Penetrating the System - jude-lindale/Wiki GitHub Wiki

You can use identified security vulnerabilities to do the following:

  • Gain further information about the host and its data.
  • Obtain a remote command prompt.
  • Start or stop certain services or applications.
  • Access other systems.
  • Disable logging or other security controls.
  • Capture screen shots.
  • Access sensitive files.
  • Send an email as the administrator.
  • Perform SQL injection.
  • Launch a denial of service attack.
  • Upload a file or create a backdoor user account proving the exploitation of a vulnerability.