Загрузка страницы

Windows Pentesting Lab Walkthrough: Windows Manage Hosts File Injection

In this lab, the target server is running an insecure application vulnerable to Buffer Overflow. Learn about modifying the windows hosts file to redirect a specific web URL to the attacker's web server. View this lab exercise at https://attackdefense.pentesteracademy.com/challengedetails?cid=2354

Pentester Academy is the world’s leading online cybersecurity education platform. We believe in teaching defense through offense - once you understand how attackers break into networks and systems, you know what defenses to build. Learn about our content library at https://bit.ly/36C9JFu, or sign in for free and try our hands-on labs at https://bit.ly/3xQ6CpC

FOLLOW US ON:
https://twitter.com/securitytube
https://www.linkedin.com/company/pentesteracademy
https://www.facebook.com/ST.Trainings
https://blog.pentesteracademy.com

Note: All our materials are strictly meant for educational purposes.

Видео Windows Pentesting Lab Walkthrough: Windows Manage Hosts File Injection канала Pentester Academy TV
Показать
Комментарии отсутствуют
Введите заголовок:

Введите адрес ссылки:

Введите адрес видео с YouTube:

Зарегистрируйтесь или войдите с
Информация о видео
16 июля 2021 г. 8:51:58
00:02:55
Яндекс.Метрика