Congratulations! We’ve completed a short vulnerability analysis and exploitation demo.

We’ve successfully:

  • identified a running service,
  • found a vulnerability in the service,
  • leveraged existing exploited code to exploit that vulnerability.


Continue to the next content to learn more about ethical hacking.

Sign up to start coding

Mini Info Outline Icon
By signing up for Codecademy, you agree to Codecademy's Terms of Service & Privacy Policy.

Or sign up using:

Already have an account?