Solid Metasploit

INTRODUCTION

During a full penetration test of the corporate network, you will need many tools to accomplish different tasks to find and exploit vulnerabilities. You will usually find yourself in a situation where you have to manage many sessions at once. Imagine a scenario where you compromised 10…

Offensive Security Engineer

Love podcasts or audiobooks? Learn on the go with our new app.

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Karol Mazurek

Karol Mazurek

Offensive Security Engineer

More from Medium

Buff HTB

Hack The Box::Backdoor

picoCTF write up: vault-door-1

PWN Echoland challenge — HTB