To gain access to a target device during a PenTest, vulnerabilities need to be identified first. Once these vulnerabilities are found, the PenTest-er will attempt to exploit them to gain access to the network resource. Using the information gathered during the reconnaissance and enumeration phases, the PenTest-er will begin scanning for and identifying potential vulnerabilities.

<aside> <img src="/icons/target_red.svg" alt="/icons/target_red.svg" width="40px" />

Mission Objectives


1. Vulnerability Discovery Techniques

Discovering vulnerabilities requires a mix of automated precision and manual inspection.

2. Analyzing Reconnaissance Scanning and Enumeration

This is the "Brain" of the mission—turning raw logs into a tactical plan.

3. Physical Security Concepts

A digital fortress is useless if the front door is unlocked. This lesson covers the physical barriers that a penetration tester must evaluate.