IT Security Gumbo: Exploitation with Kali
This course consists of 100% hands-on technical labs, utilizing Kali Linux to hack a variety of intentionally vulnerable operating systems. All of the resources to build the labs are free. Detailed instructions on how to set up the labs are included in this course. To make the most out of this course, it is recommended that you actually perform the activities within the labs rather than just watch the videos.
1. Exploiting Services
2. Exploiting Shell shock
3. Exploiting Privilege Escalation