Table of Contents
- Introduction and What it means to be a hacker
- Getting started - Setting up lab environment and tools required
- Reconnaissance and information gathering
- Network scanning - Discovering targets
- Network attacks - Man in the middle attack
- Malware development - Creating your own malware
- Advanced malware
- Post exploitation
- Protection - How to avoid detection

