Week 9

On our ninth session on ethical hacking and penetration testing, our main topic was about target exploitation. We were also taught how to exploit vulnerabilities step by step efficiently so that we would get every vulnerability to check correct without re-checking it. Target exploitation is really hard because it would need a lot of knowledge lots of programming language to make scripts to exploit vulnerabilities because there are a lot of ways to exploit vulnerabilities in a website. One thing that we must make sure is that never use any script given by strangers since we don’t know what kind of scripts they are giving and what damage could it cause to the server we’re currently penetrating (especially if you are unexperienced).

Category: Uncategorized
You can follow any responses to this entry through the RSS 2.0 feed. You can leave a response, or trackback from your own site.
Leave a Reply

XHTML: You can use these tags: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <s> <strike> <strong>