Get a server. Run an intrusion detection system. In the logs, you’ll collect a set of IP addresses trying to get a worm into your machine; the flavor of the attempt will tell you what vulnerability they have.
Then you can take a look. Without having to make yourself visible by scanning.
Not exactly whitehat but a good initial training.
1 Like
This topic was automatically closed after 5 days. New replies are no longer allowed.