This episode originally aired in 2016 and covers using the OWASP Zap proxy/scanner to find vulnerabilities with the Metasploitable2 virtual machine. It covers also v
If you would like to support our channel and content, we have printed/ebook publications on Amazon [https://amzn.to/3nL9RsC] and merch on Teespring [https://teespring.com/stores/cybersecrets]erifying some of the vulnerabilities and using the Proxy portion of the OWAS Zap.
If you would like to support our channel and content, we have printed/ebook publications on Amazon [https://amzn.to/3nL9RsC] and merch on Teespring [https://teespring.com/stores/cybersecrets]
0 Comments