Learn
Congratulations! We’ve completed a short vulnerability analysis and exploitation demo.
We’ve successfully:
- identified a running service,
- found a vulnerability in the service,
- leveraged existing exploited code to exploit that vulnerability.
Instructions
Continue to the next content to learn more about ethical hacking.
Sign up to start coding
By signing up for Codecademy, you agree to Codecademy's Terms of Service & Privacy Policy.