What this book covers
Chapter 1, Introduction to Hacking, is where you will learn the fundamentals of hacking.
Chapter 2, Getting Started – Setting Up a Lab Environment, sees you set up a lab environment.
Chapter 3, Reconnaissance and Information Gathering, covers getting to know the victim.
Chapter 4, Network Scanning, teaches you how to explore local networks.
Chapter 5, Man in the Middle Attacks, goes into depth on how to attack a local network.
Chapter 6, Malware Development, covers developing your own malware.
Chapter 7, Advanced Malware, explores developing advanced features.
Chapter 8, Post Exploitation, looks at exploiting the victim machine.
Chapter 9, System Protection and Perseverance, is all about protecting your system against external attacks.