Table of Contents
- Planning and Preparation
- Information Gathering
- Setting up and maintaining the C&C Server
- Vulnerability Scanning and Metasploit
- Traffic sniffing and spoofing
- Password based Attacks
- Attacks on the Network Infrastructure
- Web application Attacks
- Cleaning up and Getting out
- Writing up the penetration testing Report

