as_gal wrote: » Hey Ritual, I did a number of online courses related to the subject. The problem is putting all these down in practice. I have access to some lab and been able to enumerate and get a good idea about some hosts but where do I go if I find no metasploit module to work on my case? How can I get an explanation or instruction of exploiting a platform with which I haven't previously worked? It is all about experience and the best way to get it is to speak to the people who owns it. I need an interactive source where I can provide description of a problem and get an answer that will point me to the right direction.