A5d9304ac11ecdc86743ac22d3396094

Abstract

Introduction of the metasploit.
How to identify and validate the vulnerabilities.
Laptop Required for CTF Participation.

Speaker

Ajay

Timing

Starts at Wednesday August 28 2019, 07:15 PM. The sessions runs for about 1 hour.

Resources