Identifying and exploiting vulnerable services
In this section, you will learn how to use various techniques and tools within Kali Linux. These will help you efficiently identify and exploit security vulnerabilities found on both Windows and Linux-based operating systems that have vulnerable applications and network services running on them.
Exploiting Linux-based systems
In this section, you will learn how to discover and exploit the low-hanging fruits, which are easy-to-exploit security vulnerabilities on a targeted system, with the intention to compromise and gain unauthorized access to the target. The low-hanging fruits are simply the security vulnerabilities that are easier to compromise, use fewer resources, and are not complex. In the following exercise, you will learn how to identify a security vulnerability within the File Transfer Protocol (FTP) service on the targeted Linux-based system.
To get started with this exercise, please use the following instructions...