This document is an introduction to penetration testing that is divided into five parts:
1. The Basics covers setting up a virtual lab, using Kali Linux, programming basics, and the Metasploit framework.
2. Assessments includes chapters on information gathering, vulnerability identification, and traffic capturing.
3. Attacks focuses on exploitation, password attacks, client-side attacks, social engineering, and bypassing antivirus software.
4. Exploit Development teaches stack-based buffer overflows, structured exception handler overwrites, fuzzing, and creating Metasploit modules.
5. Mobile Hacking presents the Smartphone Pentest Framework for assessing Android and iOS applications and devices.