April 2017
Intermediate to advanced
512 pages
7h 59m
English
In this chapter, we will cover the following recipes:
exploit-db scriptsIn the previous chapter, we enumerated the open ports and searched for possible vulnerabilities. In this chapter, we are going to perform penetration testing of the system over the network. For the purpose of demonstration, we have taken a vulnerable OS called Stapler, made by g0tmi1k. Stapler ...
Read now
Unlock full access