Types of shell
Payloads
Gaining Root with Metasploit
Manual Exploitation
Post Exploitation
Brute Force Attacks
Credential Stuffing
Password Spraying
Getting in a network in an external assessment