Reconnaissance > Scanning & Enumeration > Gaining Access > Maintaining Access > Covering Tracks
<aside>
💡 Always save the complete scan results or findings in a file and also make good notes like key points from your process.
</aside>
Reconnaissance
Scanning & Enumeration
Additional Scanning Tools
Exploitation Basics
Hack The Box Walkthrough
Exploiting Vulnerable VMs
Introduction to Exploit Development (Buffer Overflows)
OWASP Top 10 - 2017
Active Directory
Post Exploitation
Cleaning Up
Web Application Enumeration, Revisited
Wireless Penetration Testing
Legal Documents and Report Writing