Building the Course
The following RangeControl configurations were used
The following RangeControl configurations were used
For last two years, I've been teaching introductory and advanced Ethical Hacking. An issue that I wanted to resolve was the issue of targets without context. Pulling down a vulnerable virtual machine from vulnhub or participating in a hackthebox challenge is all well and good if you want to serially go after unrelated vulnerabilities.
About Range Control