Pentesting & Network Exploitation: DMZ Exploitation

In this lab, you will gain in-depth exposure and hands-on experience with all facets of 802.3 hacking, vulnerability research, pivoting, exploitation, password/hash cracking, post-exploitation pillaging, and methods of setting up persistence on a victim's network.

Time
45 minutes
Difficulty
Intermediate
Share
NEED TO TRAIN YOUR TEAM? LEARN MORE
Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *
or

Already have an account? Sign In »

Overview

In this lab, you will gain in-depth exposure and hands-on experience with all facets of 802.3 hacking, vulnerability research, pivoting, exploitation, password/hash cracking, post-exploitation pillaging, and methods of setting up persistence on a victim's network.