Application
- Several web applications
- Need to complete all
- Three infrastructure hosts
- Need to complete all
Information
- Requires web pentest techniques
- Requires information gathering
- Fuzzing host files
- Bypass specific tweak flawed
- Knowledge of exploiting flaws
- Requires host pentest techniques
- Tools for port scans
- Scans for services expose
- Exploiting vulnerabilities
- Privilege escalate issues found
Exploit
- OWASP Top 10 knowledge
- Kali Linux tools usage
- Nikto
- Dirb
- Metasploit
- Burpsuite Free Edition
- NMap
No comments:
Post a Comment