{"id":328,"date":"2025-11-17T04:02:25","date_gmt":"2025-11-17T04:02:25","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/isaac-huston\/?page_id=328"},"modified":"2025-11-17T20:03:39","modified_gmt":"2025-11-17T20:03:39","slug":"penetration-testing-and-exploitation","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/isaac-huston\/skills\/penetration-testing-and-exploitation\/","title":{"rendered":"Penetration Testing and Exploitation"},"content":{"rendered":"\n<h3 class=\"wp-block-heading has-vivid-cyan-blue-color has-text-color has-link-color wp-elements-9c27bd2a4ef8edd0523d1c8441dd53cb\"><a href=\"https:\/\/sites.wp.odu.edu\/isaac-huston\/privilege-escalation-using-text-editors-write-up\/\" data-type=\"page\" data-id=\"379\">Privilege Escalation using Text Editors Write-up<\/a><\/h3>\n\n\n\n<p id=\"block-a98495bb-79da-429a-9c8c-02f3869eb87c\">Explains how insecure configurations enable privilege escalation and demonstrates proper mitigation awareness.<\/p>\n\n\n\n<h3 class=\"wp-block-heading has-vivid-cyan-blue-color has-text-color has-link-color wp-elements-b404f8190cb07760cfd68feb49710798\"><a href=\"https:\/\/sites.wp.odu.edu\/isaac-huston\/skills\/penetration-testing-and-exploitation\/bind-and-reverse-shell-reference-guide\/\" data-type=\"page\" data-id=\"382\">Bind and Reverse Shell Reference Guide<\/a><\/h3>\n\n\n\n<p id=\"block-0a923d0c-16f9-4863-9388-036ce72ea1ac\">Outlines shell types, connection handling, and post-exploitation access techniques. Shows strong understanding of remote access control.<\/p>\n\n\n\n<h3 class=\"wp-block-heading has-vivid-cyan-blue-color has-text-color has-link-color wp-elements-93967b0255e23b8bcac2136fdd4c6857\"><a href=\"https:\/\/sites.wp.odu.edu\/isaac-huston\/metasploit-framework-exploitation-guide\/\" data-type=\"page\" data-id=\"384\">Metasploit Framework Exploitation Guide<\/a><\/h3>\n\n\n\n<p>Documents exploit module use, payload configuration, and validation of successful compromise. Reflects practical offensive testing ability.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Privilege Escalation using Text Editors Write-up Explains how insecure configurations enable privilege escalation and demonstrates proper mitigation awareness. Bind and Reverse Shell Reference Guide Outlines shell types, connection handling, and post-exploitation access techniques. Shows strong understanding of remote access control. Metasploit Framework Exploitation Guide Documents exploit module use, payload configuration, and validation of successful compromise&#8230;. <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/isaac-huston\/skills\/penetration-testing-and-exploitation\/\">Read More<\/a><\/div>\n","protected":false},"author":30346,"featured_media":0,"parent":318,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/isaac-huston\/wp-json\/wp\/v2\/pages\/328"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/isaac-huston\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/isaac-huston\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/isaac-huston\/wp-json\/wp\/v2\/users\/30346"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/isaac-huston\/wp-json\/wp\/v2\/comments?post=328"}],"version-history":[{"count":3,"href":"https:\/\/sites.wp.odu.edu\/isaac-huston\/wp-json\/wp\/v2\/pages\/328\/revisions"}],"predecessor-version":[{"id":386,"href":"https:\/\/sites.wp.odu.edu\/isaac-huston\/wp-json\/wp\/v2\/pages\/328\/revisions\/386"}],"up":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/isaac-huston\/wp-json\/wp\/v2\/pages\/318"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/isaac-huston\/wp-json\/wp\/v2\/media?parent=328"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}