Exploitation
Covers offensive reconnaissance and enumeration tools used in authorized lab environments: port and service scanning with nmap and masscan, web content discovery with ffuf, wordlist generation, and credential testing with hydra. All exercises target the Docker lab hosts only.