pen-200 active_directory_introduction_and_enumeration antivirus_evasion assembling_the_pieces attacking_active_directory_authentication client-side_attacks common_web_application_attacks fixing_exploits information_gathering introduction_to_web_application_attacks lateral_movement_in_active_directory linux_privilege_escalation locating_public_exploits password_attacks port_redirection_and_ssh_tunneling sql_injection_attacks the_metasploit_framework tunneling_through_deep_packet_inspection vulnerability_scanning windows_privilege_escalation playground tools nmap wiki dokuwiki syntax welcome blue-phoenix commands elastic skynet startpage typo310lts typo311lts virtual_disk_formats