Exploitation Plan
Exploitation Plan Guidelines
1. Machine IP address
2. Synopsis of tools used
3. Procedures for exploitation
4. Figures/screen shots of exploitation
5. Observations during exploit
6. Vulnerability details and solutions
a. Rating (0-10)
b. Affected system (machine IP)
c. Impacts
d. Remediation
7. Post exploitation possibilities and network impacts
Grab BEST Deal Ever.