15 - Exploit Resources
16 - Denial of Service
17 - ARP and DNS Poisoning
18 - Password Attacks
19 - VLAN Hopping
20 - MAC Spoofing
21 - Wireless Attacks
22 - OWASP Top 10 Web App Security Risks
23 - SSRF Attacks
24 - Business Logic Flaws
25 - SQL Injection Attacks
26 - Other Injection Attacks
27 - XSS Attacks
28 - Session Attacks
29 - API Attacks
30 - Cloud Attacks
31 - Mobile Attacks
32 - IoT Hacking
33 - Data Storage System Vulnerabilities
34 - ICS SCADA and IIOT Vulnerabilities
35 - Virtual Environment Vulnerabilities
36 - Container Vulnerabilities
37 - Social Engineering and Physical Attacks
38 - Post Exploitation Enumeration and Tools
39 - Network Segmentation Testing
40 - Privilege Escalation
41 - Persistence
42 - Detection Avoidance