Table of contents Introduction Preparation Before you start Part 1 - How to hack Part 2 - Hacking manually Part 3 - Web hacking Part 4 - Privilege escalation What now?