Basic SQL exercises and injections, installing and breaking into Metasploitable 2, EXTENSIVE analysis of the ports and services open on Metasploitable 2. Damn Vulnerable Web App hacking.
Copy and paste this URL into your WordPress site to embed
Copy and paste this code into your site to embed