Pentesting & Network Exploitation: DMZ Exploitation
In this lab, you will gain in-depth exposure and hands-on experience with all facets of 802.3 hacking, vulnerability research, pivoting, exploitation, password/hash cracking, post-exploitation pillaging, and methods of setting up persistence on a victim's network.
Time
45 minutes
Difficulty
Intermediate
Share
Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *
or
Already have an account? Sign In »

Overview
In this lab, you will gain in-depth exposure and hands-on experience with all facets of 802.3 hacking, vulnerability research, pivoting, exploitation, password/hash cracking, post-exploitation pillaging, and methods of setting up persistence on a victim's network.
Learning Partner