• laurelraven
    link
    fedilink
    arrow-up
    40
    ·
    10 months ago

    It’s going to be a system set up with known vulnerabilities that should be easy to locate using common tools already installed on Kali; a real world scenario should (at least in theory) not be that simple, but in a capture the flag pentest environment, that’s pretty normal