Penetration Testing Environment Setup
Information Gathering, Finding Vulnerabilities, Capturing Traffic
Exploitation & Password Attacks
Client Side Attacks & Social Engineering
Bypassing Antivirus Applications & Post Exploitation
Buffer Overflow - Linux & Windows
& Exception Handler Overwrites & Fuzzing, Porting Exploits, and Metasploit Modules