L7 Exploiting Host-Based Vulnerabilities

Please purchase the course before starting the lesson.

Introduction Network services aren't the only source of vulnerability for an organization. Many exploits are aimed at server and workstation operating systems. Once you have compromised the network, you will want to zero in on specific hosts and their applications. Objectives In this lesson, you will: • Exploit Windows-based host vulnerabilities. • Exploit *nix-based host [...]

Back to: Ultimate IT Security Certification Bundle > Pentest +