- Identify systems and relevant running services.
- Analyze and describe discovered vulnerabilities.
- Determine the root cause of vulnerabilities, propose mitigations or patches, and document findings.
This project was conducted in a safe, isolated environment provided by FIT VUT.
No real devices or external systems were involved.
For educational purposes only.