Rainbow Table Attacks - Hashing algorithms
Basic Metasploit topics - Sessions - Modules - Exploit - Post exploit - Auxillary
Recognizing Recon Screens - Knowing common ports
How windows and linux handle password hashes - What they do do the hashes - Where they are stored - Windows will split passwords into 2 hashes.
Active vs Passive attacks
Online vs offline attacks
Payload vs Exploit vs Vulnerability
Reverse Shell vs Bind Shell - Reverse forces target to give you a shell - Bind is where you get a shell ON the target systems
ARP and MITM - How arp works and how it is used in MITM attacks - ARP spoofing - ARP cache, MAC -> IP
Dirb and Dirbuster
Pivoting - Moving from one box to another
Testing for Injections - Code injection spots - SQL injection spots
OWASP Top 10 Vulnerabilities
Hydra - Brute force password cracking
Basic Commands and Options - uname -a - whoami - sudo, su - pwd
65535 Ports
Hash Dump - Downloading hashes form target machine