In an assessment, it is very important to understand the potential consequences of this sort of
attack. First, they are often very noisy due to the repeated authentication attempts. Secondly,
these attacks can often result in an account lock out situation after too many invalid attempts are
performed against a single account. Finally, the performance of these attacks is often quite slow,
resulting in difficulty when attempting to use a comprehensive wordlist.
11.4.5. Client-Side Attacks
Most attacks are conducted against servers, but as services have become harder to attack, easier
targets have been selected. Client-side attacks are a result of this, where an attacker will target
the various applications installed on the workstation of an employee within a target organization.
The Social Engineering Tools menu category has a number of excellent applications that can help
conduct these types of attacks.
This sort of attack were commonly exploited by Flash, Acrobat Reader, and Java in the early 2000s.
Currently HTML Application (HTA) is the popular method. In the above cases, attackers would try
to solicit a target to visit a malicious web page. These pages would contain specialized code that
would trigger either vulnerabilities in these client-side applications or trick the user, resulting in
the ability to run malicious code on the targets system.
Client-side attacks are incredibly difficult to prevent, requiring a great deal of user education,
constant application updates, and network controls to effectively mitigate the risk.