Day 1
• TCP/IPbasics
• Theartofportscanning
• Targetenumeration
• Brute-forcing
• Metasploitbasics
• HackingrecentUnix vulnerabilities
• Hackingdatabases
• Hackingapplicationservers
• Passwordcracking
Day 2
• Hackingthird-partyapplications (WordPress, Joomla, Drupal)
• Windows enumeration
• Hacking recent Windows vulnerabilities
• Hacking third party software (Browser, PDF, Java)
• Post-exploitation: dumping se- crets
• Hacking windows domains