Room progress ( NaN% )
Task 1Introduction
Task 2What is an Exploit?
Task 3Vulnerability Lifecycle
Task 4Opportunity for Weaponizing Vulnerabilities
Task 5Exploit Chaining
Task 6Chaining Multiple Vulnerabilities - A Case Study
Task includes a deployable machine
Task 7Automating Common Tasks
Task 8Conclusion
Ready to learn Cyber Security? Create your free account today!
The Weaponizing Vulnerabilities room is only available for premium users. Signup now to access more than 500 free rooms and learn cyber security through a fun, interactive learning environment.
Already have an account? Log in