Overview
Level – Easy/intermediate
Skills Needed – Enumeration, Linux command line, reading and understanding source code
Goal – To successfully recreate the exploit performed on the vulnerable machine.
Known Network(s) – N/A
Tools Used – ss, ls, less
Courses