eJPT - 3.4 Exploitation
Introduction
Exploitation consists of techniques and tools used by adversaries / penetration testers to gain an initial foothold on a target system or network. You can only exploit a target if you know what is vulnerable.
Exploitation methodology:
I...
hmadsec.hashnode.dev14 min read