Chapter 1: Penetration Testing Fundamentals
Chapter 2: Pre-Engagement Activity
Chapter 3: Penetration Testing Lab Setup
Chapter 4: Reconnaissance, Open Source Intelligence (OSINT)
Chapter 5: Scanning, Enumerating Targets and Vulnerabilities
Chapter 6: Exploiting Targets
Chapter 7: Advanced Metasploit
Chapter 8: Password Attacks
Chapter 9: Stealing Data, Maintaining Access and Pivoting
Chapter 10: PowerShell for Penetration Testing
Chapter 11: Web Application Hacking
Chapter 12: Proxies, Crawlers, and Spiders
Chapter 13: OWASP Top 10
Appendix A: Tools Reference