Description
Students step through each of the Capture the Flags (CTF) walkthroughs learning how to footprint a target, enumerate the target for possible vulnerabilities, analyze the vulnerabilities and exploit the target to gain root access. Each CTF demonst