We're searching for vulnerabilities in the host, application, or information leakage.
After gathering information about the host and applications, we need to determine what versions they have.
netcat / telnet
Shodan and Censys
Throw intentional errors
Find exploits for identified versions and software on host
Create malicious payload through identified exploit. Allows further exploitation through reverse shells or other similar exploitation routes.
Execute the payload we made, there can be some very interesting and creative ways to achieve this!
Ensure that our exploits will stay persistent on the host
Move from a foothold to root!
Steal the data on the host!