Acknowledgments
Introduction
Chapter 1: Bash Basics
Chapter 2: Flow Control and Text Processing
Chapter 3: Setting Up a Hacking Lab
Chapter 4: Reconnaissance
Chapter 5: Vulnerability Scanning and Fuzzing
Chapter 6: Web Shells and Command Injection
Chapter 7: Reverse Shells
Chapter 8: Internal Information Gathering
Chapter 9: Privilege Escalation
Chapter 10: Persistence
Chapter 11: Network Probing and Lateral Movement
Chapter 12: Exfiltration and Defense Evasion
Index
The chapters in red are included in this Early Access PDF.