# Exploitation

![Basic attack circle](https://3977837039-files.gitbook.io/~/files/v0/b/gitbook-legacy-files/o/assets%2F-MfT0VPyK6X13Egd9pzy%2F-MheNk1aiAFRCoShToD4%2F-MheQNEoxXl88MQoDNPb%2Fexploit01.png?alt=media\&token=b93ddfd1-f5ef-4afc-9bd9-d05f1a74ad6d)

### Exercises

* [Metasploitable 2](https://cas-cyber.gitbook.io/cas-cybersecurity/exploitation/metasploitable-2)
* [Redis Server](https://cas-cyber.gitbook.io/cas-cybersecurity/exploitation/redis-server)
* [Print Nightmare](https://cas-cyber.gitbook.io/cas-cybersecurity/exploitation/print-nightmare)
* [Baron Samedit](https://cas-cyber.gitbook.io/cas-cybersecurity/exploitation/baron-samedit)
* [Polikit](https://cas-cyber.gitbook.io/cas-cybersecurity/exploitation/polkit)
