5 – Exploitation

Content of Exploitation ;

  • What is an exploit?
  • Types of exploits
    • Local, remote and 0day exploits
  • Exploit Databases
  • Example Exploit Scenarios
  • Exploit Execution and Usage Scenarios
  • Exploit Frameworks
  • Payload Concept
  • Metasploit Framework
  • Antivirus Evasion Software
    • Veil-Evasion
    • Shellter
  • Application

This presentation part of Prisma CSI’s Practical White Hat Hacker Training v1

How can we help you?

Prisma consultants will be with you, whenever you need. You can contact us 7/24.

Have you explored our penetration test services?