1. Introduction
- What this Book is
- Why Does This Book Exist?
- Who Is This Book for?
- A Word of Warning
- Disclaimer
- Prerequisites
- About The Author
2. Core Fundamentals
- Numbers in Security
- Fundamental Networking
- Facilitating Attacks with DNS
3. Operating Systems
- Linux
- Windows
- MacOS
4. Virtualisation
- What is Virtualisation?
- What it is Used For
- Setting Up Your First Virtual Machine
- Other Platforms
5. Programming
- Logic
- The Basics - Functions, Variables, Learning
- Language Types
6. Infrastructure
- Reconnaissance
- Scanning
- Exploitation
- Pivoting/Further Recon/Post-Exploitation
- Other Types of Infrastructure Testing
7. Web Application Testing
- Introduction
- Tooling
- Methodologies
- Note Taking and Session Tracking
8. Importance of Reporting
- Reporting in Pentesting
- Making Things Beautiful
- Technical Findings
- Bug Bounty Reporting
9. Social & People Skills
- Meetups
- Conferences
10. Penetration Testing, Bug Bounty Hunting & <Insert Colour Teaming>
- Penetration Testing
- Bug Bounty Hunting
- Coloured Teams
11. Hacking Your Career Path
- Things to Consider
- Advertising Skillset
- Selling Yourself
12. Further Reading & Resources
- Books to Read
- Network Pentesting
- Programming
- Web Application Testing
- Quick Reference for Bag
- Web Applications for Learning on
- People to Follow on Twitter
- Links to Checkout
- Thank You
