๐Ÿ’ปSystem/Host Based Attacks

System/Host Based Attacks focus on exploiting vulnerabilities directly on operating systems and their components to gain unauthorized access or control. This section covers understanding common weaknesses in Windows and Linux systems, techniques for exploiting these vulnerabilities, and methods for escalating privileges and dumping credentials to compromise and control systems.

What Are System/Host Based Attacks?

  • System/Host based attacks are attacks that are targeted towards a specific system or host running a specific operating system, for example, Windows or Linux.

  • Network services are not the only attack vector that can be targeted during a penetration test.

  • System/Host based attacks usually come in to play after you have gained access to a target network, whereby, you will be required to exploit servers, workstations or laptops on the internal network.

System/Host Based Attacks:

  • System/Host based attacks are primarily focused on exploiting inherent vulnerabilities on the target OS.

  • Unlike network based attacks, host based attacks are much more specialized and require an understanding of the target operating system and the vulnerabilities that affect said operating systems.

  • System/Host based attacks involve exploiting misconfigurations and inherent vulnerabilities within the target OS.




Hacker's Mantra:Social engineering has become about 75% of an average hackerโ€™s toolkit, and for the most successful hackers, it reaches 90% or more. - John McAfee

Last updated