Reconnaissance > Scanning & Enumeration > Gaining Access > Maintaining Access > Covering Tracks

<aside> 💡 Always save the complete scan results or findings in a file and also make good notes like key points from your process.

</aside>

Reconnaissance

Scanning & Enumeration

Additional Scanning Tools

Exploitation Basics

Hack The Box Walkthrough

Exploiting Vulnerable VMs

Introduction to Exploit Development (Buffer Overflows)

OWASP Top 10 - 2017

Active Directory

Post Exploitation

Cleaning Up

Web Application Enumeration, Revisited

Wireless Penetration Testing

Legal Documents and Report Writing