Table of Contents
- Setting Up Kali Linux and Pentesting Environment
- Customizing Kali Linux
- Understanding Kali Linux Tools
- Learning About Your Target
- Vulnerability Assessment
- Exploiting Vulnerabilities
- Escalating Privileges
- Password Attacks
- Wireless Attacks
- Performing a Network Audit

