Using information gathering techniques to identify and enumerate targets running various operating systems.
Writing basic scripts and tools to aid in the penetration testing process.
Analyzing, correcting, modifying, cross-compiling, and porting public exploit code.
Conducting remote, local privilege escalation, and client-side attacks.
Identifying and exploiting XSS, SQL injection, and file inclusion vulnerabilities in web applications.
Leveraging tunneling techniques to pivot between networks.
Creative problem solving and lateral thinking skills.