Book Content
chapters • 19h4m total length
1. Goal-Based Penetration Testing
2. Open-Source Intelligence and Passive Reconnaissance
3. Active Reconnaissance of External and Internal Networks
4. Vulnerability Assessment
5. Advanced Social Engineering and Physical Security
6. Wireless and Bluetooth Attacks
7. Exploiting Web-Based Applications
8. Cloud Security Exploitation
9. Bypassing Security Controls
10. Exploitation
11. Action on the Objective and Lateral Movement
12. Privilege Escalations
13. Command and Control
14. Embedded Devices and RFID Hacking














