Introduction
PART I: OFFENSIVE SECURITY DEVELOPMENT
Chapter 1: Web Applications Exploits
Chapter 2: Authentication Attacks
Chapter 3: Malware Design and Distribution
PART II: OFFENSIVE SECURITY ENGINEERING
Chapter 4: Configuring OffSec Infrastructure with IaC Tools
Chapter 5: Applying Network Fundamentals to C2 Implementation
Chapter 6: Reverse VPN Tunneling
Chapter 7: Managing Infrastructure for OffSec Operations
PART III: OFFENSIVE SECURITY IN THE REAL WORLD
Chapter 8: A Red Teaming Deep Dive
Chapter 9: Scenario 1: Classic Exploitation
Chapter 10: Scenario 2: The DropBox
Chapter 11: Scenario 3: A Phishing Attack with C2 Redirectors
Chapter 12: Multiplayer C2 Configuration
The chapters in red are included in this Early Access PDF.