1. Introduction to Offensive Security
Basics of ethical hacking & pentesting
Red Team vs Blue Team concepts
Legal scope & responsible disclosure
2. Getting Comfortable with Kali Linux
Kali Linux setup & environment
Terminal basics & navigation
Package management & tools
3. Command Line Fundamentals
File handling & permissions
WHOIS, DNS, Subdomain enumeration
Vulnerability scanning techniques
Automated vs manual scanning
Understanding scan results
7. Vulnerability Research
Finding real-world vulnerabilities
Manual vs automated exploitation
10. Web Exploitation Attacks
File upload vulnerabilities
11. Windows Privilege Escalation
12. Linux Privilege Escalation
13. File Exploits (Local Exploitation)
Exploiting local vulnerabilities
Binary exploitation basics
14. Log Analysis (In-Depth)