We have few minutes to simulate a vulnerable environment to test, all toghether, step by step, the most famous penetration testing techniques.
Yes, this is the right place if you feel a bit lamer.
We will discover the most unforgivable errors that a programmer can commit and we will ride all toghether these vulnerabilities to reach the most deep privileges in a system.
The target will be to increase the awareness about the importance of the data protection.
Welcome in from zero to root. Have fun!
Do not repeat this at home.
The screenshot of Kali Linux is distributed with the CC BY-SA 3.0 license.