Welcome to DISC! Whether you're a new member or a returning member, it's awesome to be back in action. The slides are available online here, or at the link to the right.
We look forward to seeing you in person or online!
This week we briefly go over the various steps during exploitation, and some things to keep in mind during post-exploitation. It's assumed you a familiar with conducting your own reconnaissance and enumeration. https://www.youtube.com/watch?v=s1dyxjU0LLg
Unfortunately the CTF that was run in this week's session wasn't built to be made available online.
If you want to put some of the theory into practice, i recommend spinning up a Metasploitable virtual machine, doing some further research into some of the tools mentioned in the slides and throwing them at it!
As always, you can find answers to any questions or issues you're having on Slack!