Credits
Getting Comfortable with Kali Linux
Command Line Fun
Practical Tools
Passive Information Gathering
Active Information Gathering
Vulnerability Scanning
Web application Attacks
Client side attacks
Locating public exploits
Fixing public exploits
Antivirus evasion
Password Attacks
Windows Priv Esc
Linux Priv esc
Port Redirection and SSH Tunneling
Tunneling through deep packet Inspection
The metasploit Framework
Active Direction Introduction and Enumeration
Attacking Active Directory Authentication