• Types of shell
  • Payloads
  • Gaining Root with Metasploit
  • Manual Exploitation
  • Post Exploitation
  • Brute Force Attacks
  • Credential Stuffing
  • Password Spraying
  • Getting in a network in an external assessment