1. Entrance
2. Introduction
3. Virtualbox (Installation & Configuration)
4. GoldenEye VM Enumeration and Exploitation
5. ShellShock Enumeration and Exploitation (Common Vulnerabilities & Exposures-CVE)
6. Lab_Practice - Using Metasploit on Kali Linux To Take Control Of A Users PC
7. Wordpress Enumeration and Exploitation
8. Stapler VM Enumeration and Exploitation
9. Exploitation of Apache Struts (CVE 2017)
10. IMF (Impossible Mission Force) VM Enumeration and Exploitation
11. SickOS VM Enumeration and Exploitation
12. Lampiao VM Enumeration and Exploitation
13. Remote File Inclusion Attack (RFI)
14. Last_but_not_least
15. Bonus very short Lecture