Book Content
chapters • 18h16m total length
1. Goal-Based Penetration Testing with Kali Linux
2. Open Source Intelligence and Passive Reconnaissance
3. Active Reconnaissance of the External and Internal Networks
4. Vulnerability Assessment
5. Physical Security and Social Engineering
6. Wireless and Bluetooth Attacks
7. Reconnaissance and Exploitation of Web-Based Applications
8. Client-Side Exploitation
9. By-Passing Security Controls
10. Exploitation
11. Action on the Objective and Lateral movement
12. Privilege Escalation
13. Command and Control
14. Embedded and peripheral devices hacking














