Imam Abdulrahman Bin Faisal University - Dammam, Saudi Arabia
When you want to penetrate a system for ethical reasons, does the system have open ports and services? does the system have default login credentials? does the system have vulnerabilities on a certain service? How do we extract this information and used them to gain access to the system All these topics are covered in the workshop (Network services Enmuration).
When you want to penetrate a system for ethical reasons, does the system have open ports and services? does the system have default login credentials? does the system have vulnerabilities on a certain service? How do we extract this information and used them to gain access to the system
All these topics are covered in the workshop (Network services Enmuration).
Note: it is recommended to download Kali Linux before the workshop.
IAU
IAU
Vice Head of Activities Committee
Head of Media Committee
Vice Head of Media Committee
IAU
Head of Publication Committee
Vice Head of Publication Committee
IAU
Responsible for monitoring the GDSC Bevy
Contact Us