ITechnology gimmick:theme 1. Reconnaissance and Footprinting Public information DNS information 2. Enumeration Remote enumeration IP Port Techniques and tools Web enumeration Web Local enumeration Linux Windows 3. Identify Vulnerabilities Nessus Openvas NMAP 4. Exploitation Web Webshells Linux Linux Windows Windows CrackMapExec Passwords Generate passwordlists Default passwords Crack password hashes Check hashes online 5. Post Exploitation Linux Privilege escalation linEnum linPeas Windows Privelege escalation winPeas 6. Cover Your Tracks WiFi Wifi hacking WEP WPA2 WPS AirGraph Fake Access Point Fluxion EvilTwin Social Engineering BeeF SET EvilGinx2 Modlishka Tools Burp Suite Hydra Wireshark Visual Studio View Your Mind (VYM) Postman Physical attack Linux Windows Cheatsheets NMAP cheatsheet Reverse shell cheatsheet Spawning shell cheatsheet File transfer cheatsheet SQL Injection cheatsheet Network cheatsheet MySQL cheatsheet Useful