Table of Contents
- PYTHON WITH PENETRATION TESTING AND NETWORKING
- SCANNING PENTESTING
- SNIFFING AND PENETRATION TESTING
- Network Attacks and Prevention
- WIRELESS PENTESTING
- Honeypot, Building A Trap for attackers
- FOOTPRINTING OF A WEB SERVER AND A WEB APPLICATION
- CLIENT-SIDE AND DDOS ATTACKS
- PENTESTING OF SQLI AND XSS

