Table of contents Contents A's Apache SSL Attacking MSSQL with Metasploit AVBypass B's Bash Scripting C's Cisco IOS Command Line Cookie Stealing E's Exploit Development H's HTTP Basic Authentication I's IKE-Scan L's Local Privilege Escalation Local Sam Dump R's Reverse Shells S's SCP SMB Capture SMB Enumeration SMTP Open Relay Services Ports SQL Injection W's Wireless Testing