Credits

Getting Comfortable with Kali Linux

Command Line Fun

Practical Tools

Passive Information Gathering

Active Information Gathering

Vulnerability Scanning

Web application Attacks

Client side attacks

Locating public exploits

Fixing public exploits

Antivirus evasion

Password Attacks

Windows Priv Esc

Linux Priv esc

Port Redirection and SSH Tunneling

Tunneling through deep packet Inspection

The metasploit Framework

Active Direction Introduction and Enumeration

Attacking Active Directory Authentication