Tools
basics/pre-req
Working Tools
Practice Tools
Network Analysis Tools
Passive Information Gathering
Active Information Gathering
Vulnerability Scanning
Web Application Exploit
Buffer Overflow
Real World!
Checklist (CTF targetted)
Malicious payload