{%hackmd @themes/orangeheart %} ![image](https://hackmd.io/_uploads/B1yY7cXU6.png) # 1. Exploiting the LAN and Cloud # 2. Testing Wireless Networks # 3. Targeting Mobile Devices # 4. Attacking Specialized Systems # 5. Web Application-Based Attacks # 6. Performing System Hacking # 7. Scripting and Software Development # 8. Leveraging the Attack: Pivot and Penetrate # 9. Communicating During the PenTesting Process