Did you know Cybrary's video training is FREE? Join more than 2,500,000 IT and cyber security professionals, students, career changers, and more, growing their careers on Cybrary.
The next step in the Hacker Methodology is to gain access to a vulnerable site. In this video we discuss several techniques for gaining access: - Exploit published vulnerabilities about software versions running on the site. - Gain access if a service is using default credentials. - Exploit the weakest link: humans. - Attempt a "Hail Mary" using Armitage