Table of Contents: 1. Introduction to Hacking 2. Linux Basics 3. Information Gathering Techniques 4. Target Enumeration and Port Scanning Techniques 5. Vulnerability Assessment 6. Network Sniffing 7. Remote Exploitation 8. Client Side Exploitation 9. Post-Exploitation 10. Windows Exploit Development Basics 11. Wireless Hacking 12. Web Hacking