Table of Contents
- Open Source Intelligence
- Bypassing Network Access Control
- Sniffing and Spoofing
- Windows Passwords on the Network
- Assessing Network Security
- Cryptography and the Penetration Tester
- Advanced Exploitation with Metasploit
- Python Fundamentals
- PowerShell Fundamentals
- Shellcoding - The Stack
- Shellcoding - Bypassing Protections
- Shellcoding - Evading Antivirus
- Windows Kernel Security
- Fuzzing Techniques
- Going Beyond the Foothold
- Escalating Privileges
- Maintaining Access
- Answers

