
Penetration Testing Environment Setup

Information Gathering, Finding Vulnerabilities, Capturing Traffic

Exploitation & Password Attacks

Client Side Attacks & Social Engineering

Bypassing Antivirus Applications & Post Exploitation

Buffer Overflow - Linux & Windows

& Exception Handler Overwrites & Fuzzing, Porting Exploits, and Metasploit Modules