How the incorrect use of port knocking can lead to system compromise.
The basics of finding And exploiting vulnerabilities using Metasploit.
How attackers can exploit misconfigured Cron permissions to gain root access.
How to get started hacking Android applications.
How to perform source code review to find vulnerabilities in web applications.
And how attackers bypass account lockout when brute-forcing passwords.
And how to hide executable PHP code in JPEG files.
Obtaining illegal data access using XPATH injections.