eJPT Notes Back Information Gathering Footprinting and Scanning Service Enumeration Vulnerability Assessment & Exploitation Metasploit Framework Network Based Attacks Exploitation Post Exploitation