Gaining Access Introduction
Everything is a computer
Two main approaches
(1)Server Side
Do not require user interaction, all we need is a target IP!
Start with information gathering, find open ports, OS, installed services, and work from there.
(2)Client Side
Require user interaction, such as opening a file, a link.
Informaiton gathering is key here, create a trojan and use social engineering to get the target to run it.
>>>>What if the target uses the same nerwork as us...