Video Description

The next step in the Hacker Methodology is to gain access to a vulnerable site. In this video we discuss several techniques for gaining access: - Exploit published vulnerabilities about software versions running on the site. - Gain access if a service is using default credentials. - Exploit the weakest link: humans. - Attempt a "Hail Mary" using Armitage

Course Modules

Instructed By

Instructor Profile Image
CyDefe
Instructor