# Host & Network Penetration Testing

- [3.1 System / Host Based Attacks](/main/ejpt-notes/host-and-network-penetration-testing/3.1-system-host-based-attacks.md)
- [CTF 1 - System / Host Based Attacks](/main/ejpt-notes/host-and-network-penetration-testing/3.1-system-host-based-attacks/ctf-1-system-host-based-attacks.md)
- [CTF 2 - System / Host Based Attacks](/main/ejpt-notes/host-and-network-penetration-testing/3.1-system-host-based-attacks/ctf-2-system-host-based-attacks.md)
- [3.2 Network Based Attacks](/main/ejpt-notes/host-and-network-penetration-testing/3.2-network-based-attacks.md)
- [CTF - Network Based Attacks](/main/ejpt-notes/host-and-network-penetration-testing/3.2-network-based-attacks/ctf-network-based-attacks.md)
- [3.3 The Metasploit Framework](/main/ejpt-notes/host-and-network-penetration-testing/3.3-the-metasploit-framework.md)
- [CTF 1 - The Metasploit Framework](/main/ejpt-notes/host-and-network-penetration-testing/3.3-the-metasploit-framework/ctf-1-the-metasploit-framework.md)
- [CTF 2 - The Metasploit Framework](/main/ejpt-notes/host-and-network-penetration-testing/3.3-the-metasploit-framework/ctf-2-the-metasploit-framework.md)
- [3.4 Exploitation](/main/ejpt-notes/host-and-network-penetration-testing/3.4-exploitation.md)
- [CTF 1 - Exploitation](/main/ejpt-notes/host-and-network-penetration-testing/3.4-exploitation/ctf-1-exploitation.md)
- [CTF 2 - Exploitation](/main/ejpt-notes/host-and-network-penetration-testing/3.4-exploitation/ctf-2-exploitation.md)
- [CTF 3 - Exploitation](/main/ejpt-notes/host-and-network-penetration-testing/3.4-exploitation/ctf-3-exploitation.md)
- [3.5 Post-Exploitation](/main/ejpt-notes/host-and-network-penetration-testing/3.5-post-exploitation.md)
- [CTF 1 - Post-Exploitation](/main/ejpt-notes/host-and-network-penetration-testing/3.5-post-exploitation/ctf-1-post-exploitation.md)
- [CTF 2 - Post-Exploitation](/main/ejpt-notes/host-and-network-penetration-testing/3.5-post-exploitation/ctf-2-post-exploitation.md)
- [3.6 Social Engineering](/main/ejpt-notes/host-and-network-penetration-testing/3.6-social-engineering.md)
