Table of Contents - Introduction to Advanced Infrastructure Penetration Testing
- Advanced Linux Exploitation
- Corporate Networks and Databases Exploitation
- Active Directory Exploitation
- Docker Exploitation
- Exploiting git and Continuous Integration (CI) servers
- Metasploit and Powershell for Post Exploitation
- VLAN Exploitation
- VoIP Exploitation
- Insecure VPNs Exploitation
- Routing and Router vulnerabilities
- Internet Of Things Exploitation