Ethical Hacking Definitions: https://medium.com/@jorgeorchilles/ethical-hacking-definitions-9b9a6dad4988 Ethics isn't just permission: https://github.com/redteamethics/redteamethics Petition to support ethical hackers: https://www.change.org/p/organizations-support-ethical-hackers Vulnerability scanning tool used, Tenable Nessus: https://www.tenable.com/products/nessus Exploitation framework used: https://www.metasploit.com/ Vulnerability Management is hard: https://medium.com/@jorgeorchilles/vulnerability-management-is-hard-how-do-you-prioritize-what-to-patch-1fc8e163d740 Example vulnerability discussed (CVE-2020-0796 SMBGhost/CoronaBlue): https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0796 https://nvd.nist.gov/vuln/detail/CVE-2020-0796 https://attackerkb.com/topics/2LCXe3EPAZ/cve-2020-0796---smbghost?referrer=home Evolve from CVE to TTP with MITRE ATT&CK: https://attack.mitre.org/ Threat Intelligence with ATT&CK Navigator: https://mitre-attack.github.io/attack-navigator/enterprise/ Choosing the correct Command and Control Framework: https://www.thec2matrix.com/ Virtual machine with 8 command and controls tools: SANS Slingshot C2 Matrix Edition: https://howto.thec2matrix.com/slingshot-c2-matrix-edition