Book Content
chapters • 8h36m total length
1. Planning and Preparation
2. Information Gathering
3. Setting up and maintaining the C&C Server
4. Vulnerability Scanning and Metasploit
5. Traffic sniffing and spoofing
6. Password based Attacks
7. Attacks on the Network Infrastructure
8. Web application Attacks
9. Cleaning up and Getting out
10. Writing up the penetration testing Report














