Book Content
chapters • 13h28m total length
1. CHOOSING YOUR KALI DISTRIBUTION (DISTRO-MATH)
2. PREPARATION OF KALI (SHARPENING THE SAW)
3. INFORMATION GATHERING AND VULNERABILITY ASSESSMENT
4. SNIFFING AND SPOOFING
5. PASSWORD ATTACKS
6. NetBIOS Name Service and LLMNR
7. GAINING ACCESS
8. WINDOWS PRIVILEGE ESCALATION
9. MAINTAINING ACCESS
10. REVERSE ENGINEERING AND STRESS TESTING














