Ethical Hacking and Penetration Testing A penetration testing framework Table of Contents Download Grace Hopper Presentation Deck Installing VM and Kali on virtual box View Kali Linux in full-screen mode Basic Linux Commands Basic Networking Technologies Passive Information Gathering Active Information Gathering Web Penetration Testing Installing OWASP HTTP Requests Http Response Configuring BurpSuite Whatweb and Dirb Injection Attacks Command Line Injection SQL Injection References