Activity 2.1 - Vulnerability Scanning with Nikto
Activity 2.2 - File Inclusion Vulnerabilities
Activity 2.3 - Command Injection Vulnerabilities
Target 2 - Exploiting Bifurarrow-up-right
Last updated 4 months ago