• Penetration testing methodologies
• Stealthy network recon
• Passive traffic identification
• Remote root vulnerability exploitation
• Privilege escalation hacking
• IPv6 Vulnerabilities
• Hacking by brute forcing remotely Hacking web applications Breaking into databases with SQL injection
• Cross-site scripting