Overview
Dive into the sixth episode of a penetration testing tutorial series focused on the "Nibbles" challenge. Learn how to conduct a comprehensive security assessment by reviewing nmap scan results, utilizing searchsploit to identify potential exploits, enumerating and exploiting vulnerabilities on port 80, and exploring Linux privilege escalation techniques. Gain practical insights into ethical hacking methodologies and enhance your cybersecurity skills through this hands-on demonstration.
Syllabus
- Introduction.
- Reviewing the nmap scan.
- Using searchsploit to find exploits.
- Enumerating and exploiting port 80.
- Looking into Linux privilege escalation.
Taught by
The Cyber Mentor