Hi,I'm a security professionalist working as a security analyst for like 5 years in the industry. Penetration Testing:What You Should Know Getting Comfortable with Kali Linux The Essential Tools Passive Information Gathering Active Information Gathering Vulnerability Scanning Buffer Overflows Win32 Buffer Overflow Exploitation Linux Buffer Overflow Exploitation Working with Exploits File Transfers Privilege Escalation Client Side Attacks Web Application Attacks Password Attacks PortRedirection and Tunneling TheMetasploitFramework Bypassing Antivirus Software Assembling the Pieces:Penetration Test Breakdown Extra Offers: 1. Social engineering 2. Tools installations for social engineering 3. Extra tools for complete help 4. And a lot more.