<aside> 📝 By: Ahmed Waly
</aside>
The Five stages of ethical hacking
Information Gathering (Reconnaissance)
Attacking Active Directory: Initial Attack Vectors
Attacking Active Directory: Post-Compromise Enumeration
Attacking Active Directory: Post-Compromise Attacks
Web Application Enumeration, Revisited
Find & Exploit Common Web Vulnerabilities