Reconnaissance, Enumeration & Attack Planning
- Network Enumeration With Nmap
- Footprinting
- Information Gathering - Web
- Vulnerability Assessment
- File Transfers
- Shells & Payloads
Exploitation & Lateral Movement
- Password Attacks
- Attacking Common Services
- Pivoting, Tunneling, and Port Forwarding
- Active Directory Enumeration & Attacks