Table of contents 📝 eJPTv2-Notes 1⃣ Assessment Methodologies & Auditing 1.1 Information Gathering 1.2 Footprinting & Scanning 1.3 Enumeration SMB Enum FTP Enum SSH Enum HTTP Enum MySQL Enum SMTP Enum 1.4 Vulnerability Assessment 1.5 Auditing Fundamentals 2⃣ Host & Network Penetration Testing 2.1 System/Host Based Attacks Windows Vulnerabilities Linux Vulnerabilities 2.2 Network Based Attacks 2.3 The Metasploit Framework (MSF) MSF Introduction Information Gathering & Enumeration Vulnerability Scanning Client-Side Attacks Exploitation Post Exploitation Armitage 2.4 Exploitation 2.5 Post-Exploitation 2.6 Social Engineering 3⃣ Web Application Penetration Testing 3.1 Intro to Web App Pentesting 🛣 RoadMap 📔 eJPT Cheat Sheet