Lab 04 – Exploitation
INFA-735
Overview
Write up a blog style research paper (minimum 5 pages) on a recent offensive technique in one of the following categories. It does not have to be strictly binary exploitation but should be related. For example, abusing active directory for purposes of escalating privileges would be acceptable.
- Web Applications
- Active Directory
- Binary
- Cloud
Reference if you don’t have a place to start: