Introduction
1. Bash Basics
2. Flow Control and Text Processing
3. Setting Up a Hacking Lab
4. Reconnaissance
5. Vulnerability Scanning and Fuzzing
6. Web Shells and Command Injection
7. Reverse Shells
8. Internal Information Gathering
9. Privilege Escalation
10. Persistence
11. Network Probing and Lateral Movement
12. Defense Evasion
13. Exfiltration and Counter Forensics
The chapters in red are included in this Early Access PDF.