Table of Contents
- Introduction
- Setting up The Lab
- Linux Basics
- Network Penetration Testing
- Network Penetration Testing - Pre Connection Attacks
- Network Penetration Testing - Gaining Access (WEP/WPA/WPA2 Cracking)
- Post Connection Attacks
- Man-in-the-middle Attacks
- Network Penetration Testing - Detection & Security
- Gaining Access to Computer Devices
- Scanning vulnerabilities using Tools
- Client Side Attacks
- Client Side Attacks - Social Engineering
- Attack and Detect Trojans with BeEF
- Attacks Outside The Local Network
- Post Exploitation
- Website Penetration Testing
- Website Pentesting - Information Gathering
- File Upload, Code Execution & File Inclusion Vulns
- SQL Injection Vulnerabilities
- Cross Site Scripting Vulnerabilities
- Website Pentesting - Discovering Vulnerabilities Automatically Using OWASP ZAP

