Module 3: Penetration Testing with bash

In module 3, we look at using the command line during penetration tests to perform reconnaissance, identify vulnerabilities, and establish remote access.


Table of contents