Book Content
chapters • 11h52m total length
1. Preface
2. Kali quickstart
3. Passive enumeration?
4. Active enumeration (including vulnerability scanning)
5. Exploitation
6. Post Compromise - Data Harvesting, Priv Escalation
7. Post Compromise - Maintaining Access, Exfiltration
8. Physical security
9. Attacking Wireless Communications
10. Attacking web-based applications?
11. Attacking remote access???
12. Client-side exploitation
13. Appendix: Creating a test environment?














