NETWORK ADMINISTRATIONSwindows dns serverWindows server

Windows Pentesting Lab Walkthrough: Windows Manage Hosts File Injection

In this lab, the target server is running an insecure application vulnerable to Buffer Overflow. Learn about modifying the windows hosts file to redirect a specific web URL to the attacker’s web server. View this lab exercise at https://attackdefense.pentesteracademy.com/challengedetails?cid=2354

Pentester Academy is the world’s leading online cybersecurity education platform. We believe in teaching defense through offense – once you understand how attackers break into networks and systems, you know what defenses to build. Learn about our content library at https://bit.ly/36C9JFu, or sign in for free and try our hands-on labs at https://bit.ly/3xQ6CpC

FOLLOW US ON:

https://www.linkedin.com/company/pentesteracademy
https://www.facebook.com/ST.Trainings
https://blog.pentesteracademy.com

Note: All our materials are strictly meant for educational purposes.

source

by Pentester Academy TV

windows server dns

Leave a Reply

Your email address will not be published. Required fields are marked *