- Passive Information Gathering
- Active Information Gathering
- Vulnerability Scanning
- Buffer Overflows
- Buffer Exploitations
- Working with exploits
- File transfers
- Privilege Escalation
- Web application attacks
- Client-side attacks
- Fixing Exploits
- Password attacks
- Port redirection & tunneling
- The Metasploit framework
- Bypassing Anti-virus software
- Penetration test breakdown