Testing Lisa Bock Videos — Ethical Hacking: Penetration

At 5:45 AM, the first shift crew arrived. Maya handed the report to her manager. "Acme is leaky," she said. "But they're not breached. Yet."

As she packed her bag, the sun glowed orange over the horizon. She thought about Lisa’s final lesson from the Wireshark Deep Dive : “Every packet tells a story. Your job is to listen to the ones that are screaming.”

"Watch her," he’d said. "She’ll teach you how to think like the bad guys, so you can stay one step ahead." ethical hacking: penetration testing lisa bock videos

She was inside. The Acme server’s file system sprawled before her like a digital city map. She could see configuration files, shadow password backups, even a plaintext .sql file named customers_backup.sql .

At 2:45 AM, she launched nmap . A careful, stealthy SYN scan against their public IP range. The results came back: port 22 (SSH) was open, but filtered. Port 443 (HTTPS) was wide open—their customer portal. And port 8080? That was odd. An admin login for an old Apache Tomcat server. At 5:45 AM, the first shift crew arrived

Three minutes later: Critical . CVE-2017-12615—a remote code execution flaw in Tomcat 7. Acme was running a version from 2017. Unpatched. Unloved.

“Penetration testing is not about destruction. It is about discovery. A good pentester delivers a report that doesn’t just list failures—it provides a roadmap to resilience. You are not a pirate. You are a fire marshal. You find the faulty wiring before the building burns down.” "But they're not breached

Maya took a screenshot of the passwd file and the SQL dump. Proof of concept. She did not open a single customer record.