Fundamentals of the Hacking methodology
Acknowledgment of vulnerabilities
How to identify location and provider through IP
Identification of eMail and DNS servers
Working with Scan and Exploitation
Buffer Overflow, Exploit and Shellcode
Using Metasploit
Keylogger Installation
Post Exploitation
Skip User Account Control
Obtaining credentials and deleting logs
Client Side Exploits
Most used types of attacks
Local and Remote Cracking