Practical Tools

Bash Scripting

Passive Information Gathering

Active Information Gathering

Vulnerability Scanning

Introduction to Web App Attacks

Web Application Attacks

SQL Injection

Passwords Attacks

Linux Privilege Escalation

Windows Privilege Escalation

Port Redirection and SSH Tunneling

Active Directory