Table of Contents
- Kali - An Introduction
- Gather Intel and Plan Attack Strategies
- Vulnerability Assessment: Poking for holes
- Web App Exploitation: Beyond OWASP Top 10
- Network Exploitation on Current Exploitation
- Wireless Attacks: Getting Past aircrack-ng
- Password Attacks: The Fault in Their Stars
- Have Shell, Now What ?
- Buffer Overflows
- Elementary, My Dear Watson - Digital Forensics
- Playing with Software Defined Radios
- Kali in your pocket-Nethunters and raspberries
- Writing Reports

