Table of Contents
- Kali - An Introduction
- Gathering Intel and Planning Attack Strategies
- Vulnerability Assessment
- Web App Exploitation
- Network Exploitation on Current Exploitation
- Wireless Attacks
- Password Attacks
- Have Shell, Now What ?
- Buffer Overflows
- Playing with Software Defined Radios
- Kali in your pocket-Nethunters and raspberries
- Writing Reports

