Book Content
chapters • 13h12m total length
1. Introduction to Advanced Infrastructure Penetration Testing
2. Advanced Linux Exploitation
3. Corporate Networks and Databases Exploitation
4. Active Directory Exploitation
5. Docker Exploitation
6. Exploiting git and Continuous Integration (CI) servers
7. Metasploit and Powershell for Post Exploitation
8. VLAN Exploitation
9. VoIP Exploitation
10. Insecure VPNs Exploitation
11. Routing and Router vulnerabilities
12. Internet Of Things Exploitation














