Student Reviews
( 5 Of 5 )
1 review
Video of Web Application Exploitation & Linux Privielge Escalation EP2 Metasploitable 1 Walkthrough in Metasploit Framework course by Motasem Hamdan Cyber Security & Tech channel, video No. 26 free certified online
In this video walkthrough, we covered the first part of Metasploitable 1 lab where we demonstrated Twiki exploitation and Linux privielge escalation through kernel exploitation.
Receive Cyber Security Field, Certifications Notes and Special Training Videos
https://www.youtube.com/channel/UCNSdU_1ehXtGclimTVckHmQ/join
Writeup
https://motasem-notes.net/metasploitable-1-complete-walkthrough-tutorial/
LinkedIn
[1]: https://www.linkedin.com/in/motasem-hamdan-7673289b/
[2]: https://www.linkedin.com/in/motasem-eldad-ha-bb42481b2/
Instagram
https://www.instagram.com/dev.stuxnet/
Twitter
https://twitter.com/ManMotasem
Facebook
https://www.facebook.com/motasemhamdantty/