1. Introduction
  2. Part I: Foundations
  3. Welcome to Trapdoor Security
  4. Building Your Lab
  5. The Hacker Mindset
  6. Networking for Hackers
  7. Part II: Reconnaissance
  8. Passive Information Gathering
  9. Active Reconnaissance & Port Scanning
  10. Part III: Service Exploitation
  11. HTTP/HTTPS (80, 443, 8080, 8443)
  12. SSH (22)
  13. FTP (20, 21)
  14. SMB (139, 445)
  15. Database Services
    1. MySQL (3306)
    2. PostgreSQL (5432)
    3. MSSQL (1433)
    4. MongoDB (27017)
    5. Redis (6379)
  16. DNS (53)
  17. Email Services
    1. SMTP (25, 587)
    2. POP3 (110, 995)
    3. IMAP (143, 993)
  18. SNMP (161, 162)
  19. RDP (3389)
  20. NFS (2049)
  21. LDAP (389, 636)
  22. Less Common Services
    1. VNC (5900)
    2. Telnet (23)
    3. TFTP (69)
    4. Rsync (873)
    5. Docker (2375, 2376)
    6. Kubernetes
    7. Jenkins (8080)
    8. Elasticsearch (9200)
  23. Part IV: Post-Exploitation
  24. Linux Privilege Escalation
  25. Windows Privilege Escalation
  26. Lateral Movement & Pivoting
  27. Persistence Mechanisms
  28. Part V: Specialized Topics
  29. Active Directory Deep Dive
  30. Cloud Security
    1. AWS Security
    2. Azure Security
    3. GCP Security
  31. Wireless & Physical Security
  32. Social Engineering
  33. Part VI: Professional Skills
  34. Writing Penetration Test Reports
  35. Your Path Forward
  36. Appendices
  37. Command Reference Cheat Sheet
  38. Tool Installation Guides
  39. Legal Frameworks & Resources
  40. Recommended Reading
  41. Community & Resources
  42. Contributing
  43. About the Author