The lodge
The lodge was still and silent; she made no sound, and within the room, as without in the forest, was the blackness of storm. Only now and then a flash of lightning showed a woman’s silhouette at the desk … developing and building disposable local web application pentesting environments.

Virtual machines
Reconnaissance
- Introduction
- Recon-ng
- Using whois
- Passive DNS recon with Shodan
- Tools for DNS zone transfers
- Researching certificates
- Finding ASN numbers
- Listing subdomains
- Tracing routes
- Advanced searching
- Google dorking
- Searching by image
- People search
- Website footprinting
- Custom Word List Generator (CeWL)
- DirBuster
- Discover vulnerabilities
Enumeration
Web applications
Cloud
Shellcoding tools
Assemblers and compilers
Disassemblers and decompilers
Steganography
Additional hardware
Social engineering
Network
Wireless
Mobile devices
Exploitation tools
Data exfiltration
Cryptanalysis
