Table of Contents
- Kali quickstart
- Passive enumeration?
- Active enumeration (including vulnerability scanning)
- Exploitation
- Post Compromise - Data Harvesting, Priv Escalation
- Post Compromise - Maintaining Access, Exfiltration
- Physical security
- Attacking Wireless Communications
- Attacking web-based applications?
- Attacking remote access???
- Client-side exploitation
- Appendix: Creating a test environment?

