



The same goes for the We are committed to creating a realistic hacking experience, so all vulnerabilities you find in your first mission are real life exploits. You can search their respective CVE report on exploit-db.com or by using searchsploit in Kali.The same goes for the smart billboard technology, used by many advertising companies across the US. In fact, most of the technology featured in this first official mission have existed since 2009. It might feel like science fiction, but it’s not! Stay tuned for many more of these real life hacking scenarios.