Capturing traffic with ARP spoofing
Analyzing capture traffic
Crafting TCP shells and botnets
Cryptography and ransomware
Fuzzing and zero-day vulnerabilities
Building and installing Linux rootkits
Stealing and cracking passwords
Serious cross-site scripting exploitation
Pivoting and privilege escalation
Moving through the Corporate Windows Network
Capturing traffic with ARP spoofing
Analyzing capture traffic
Crafting TCP shells and botnets
Cryptography and ransomware
Fuzzing and zero-day vulnerabilities
Building and installing Linux rootkits
Stealing and cracking passwords
Serious cross-site scripting exploitation
Pivoting and privilege escalation
Moving through the Corporate Windows Network