Table of Contents
- Introduction to Penetration Testing
- Getting Started with Kali Linux
- Performing Information Gathering
- Mastering Social Engineering
- Diving into the Metasploit Framework
- Understanding Password Attacks
- Working with Burp Suite
- Attacking Web Applications
- Getting Started with Wireless Attacks
- Moving Laterally and Escalating Your Privileges
- Antivirus Evasion
- Maintaining Control within the Environment
- Reporting and Acting on Your Findings
- Where Do I Go from Here?
- Assessments

