Table of contents CTF book Mobile exploitation Exploitation Enumeration Password cracking Port Forwarding Enumeration Reverse shell Web gRPC Recon SQL Injection Wordpress