PART III

Exploiting Systems

Images  Chapter 10        Getting Shells Without Exploits

Images  Chapter 11        Basic Linux Exploits

Images  Chapter 12        Advanced Linux Exploits

Images  Chapter 13        Windows Exploits

Images  Chapter 14        Advanced Windows Exploitation

Images  Chapter 15        PowerShell Exploitation

Images  Chapter 16        Next-Generation Web Application Exploitation

Images  Chapter 17        Next-Generation Patch Exploitation