PEN-200 Information Gathering Vulnerability Scanning Introduction to Web Application Attacks Common Web Application Attacks SQL Injection Attacks Client-side Attacks Locating Public Exploits Fixing Exploits Antivirus Evasion Password Attacks Windows Privilege Escalation Linux Privilege Escalation Port Redirection and SSH Tunneling Tunneling Through Deep Packet Inspection The Metasploit Framework Active Directory Introduction and Enumeration Attacking Active Directory Authentication Lateral Movement in Active Directory Assembling the Pieces