- How to start? Targets? Create or reuse?
- Read about metasploitable, we will use it as a target
- Set up a metasploitable3 environment using Vagrant/Virtualbox
- Read about nmap
- Some tutorials nmap, examples, etc..
- VPN: mullvad vpn
- Read about SQL injection
- ' OR 1=1#'
For further actions, you may consider blocking this person and/or reporting abuse
Top comments (0)