{%hackmd @themes/orangeheart %}

# 1. Exploiting the LAN and Cloud
# 2. Testing Wireless Networks
# 3. Targeting Mobile Devices
# 4. Attacking Specialized Systems
# 5. Web Application-Based Attacks
# 6. Performing System Hacking
# 7. Scripting and Software Development
# 8. Leveraging the Attack: Pivot and Penetrate
# 9. Communicating During the PenTesting Process