PREMIUM ACCOUNTS

Support downtopc by buying or renewing your premium account using below links:







Partners
warezload

movieblogarea download
katzdownload

Cybrary-Become a Penetration Tester Path

Category: Courses / Others
Author: AD-TEAM
Date added: 20.07.2023 :51:32
Views: 8
Comments: 0










Description material

Cybrary-Become a Penetration Tester Path


Cybrary-Become a Penetration Tester Path
Language: English | Size:13.35 GB
Genre:eLearning


Files Included :

1 1 Welcome to the Penetration Tester Career Path.mp4 (41.13 MB)
MP4
1 1 Introduction.mp4 (54.52 MB)
MP4
2 1 Module 2 Overview - Theory.mp4 (2.39 MB)
MP4
2 2 What is OSINT.mp4 (41.01 MB)
MP4
2 3 Types of OSINT.mp4 (9.52 MB)
MP4
2 4 Who Uses OSINT.mp4 (16.17 MB)
MP4
2 5 The OSINT Cycle.mp4 (15.92 MB)
MP4
2 6 OSINT Ethics and Moral Dilemmas.mp4 (14.69 MB)
MP4
2 7 Module 2 Summary.mp4 (2.95 MB)
MP4
3 1 Module 3 Overview - OSINT Playground.mp4 (6.25 MB)
MP4
3 2 Computer-Secure Environment.mp4 (18.76 MB)
MP4
3 3 Notes, Notes, Notes.mp4 (31.51 MB)
MP4
3 4 Password Manager.mp4 (39.07 MB)
MP4
3 5 Validation (True or False).mp4 (7.84 MB)
MP4
3 6 Module 3 Summary.mp4 (3.6 MB)
MP4
4 1 Module 4 Overview - Tools and Techniques.mp4 (7.87 MB)
MP4
4 2 Search Engines.mp4 (40.32 MB)
MP4
4 3 Social Networks.mp4 (29.07 MB)
MP4
4 4 Emails and Usernames.mp4 (11.05 MB)
MP4
4 5 Leaks and Data Breaches.mp4 (11.09 MB)
MP4
4 6 OSINT the Systems.mp4 (44.29 MB)
MP4
4 7 Module 4 Summary.mp4 (5.19 MB)
MP4
5 1 Module 5 Overview - Sock Puppets.mp4 (4.28 MB)
MP4
5 2 What is a Sock Puppet.mp4 (18.33 MB)
MP4
5 3 How to Spot a Sock Puppet.mp4 (5.05 MB)
MP4
5 4 Module 5 Summary.mp4 (2.75 MB)
MP4
6 1 Module 6 Overview - Defense.mp4 (2.93 MB)
MP4
6 2 Operations Security (OPSEC).mp4 (11.23 MB)
MP4
6 3 OSINT Awareness.mp4 (11.05 MB)
MP4
6 4 Module 6 Summary.mp4 (2.53 MB)
MP4
7 1 Final Thoughts.mp4 (11.28 MB)
MP4
1 1 Nmap - What It Is and Why It's Important - NM.mp4 (20.2 MB)
MP4
1 2 About the Instructor - NM.mp4 (11.53 MB)
MP4
1 3 Course Overview and Prerequisites - NM.mp4 (9.32 MB)
MP4
1 4 Ethics and Legality of Scanning - NM.mp4 (32.48 MB)
MP4
2 1 Installing Nmap on Windows - NM.mp4 (37.38 MB)
MP4
2 10 Phases of the Nmap Scan - NM.mp4 (46 MB)
MP4
2 11 Constructing an Nmap Scan - NM.mp4 (38.28 MB)
MP4
2 12 Constructing an Nmap Scan Lab Part 1 - NM.mp4 (31.67 MB)
MP4
2 13 Constructing an Nmap Scan Lab Part 2 - NM.mp4 (47.01 MB)
MP4
2 14 General Considerations - NM.mp4 (56.32 MB)
MP4
2 15 Custom Scan Profiles Part 1 - NM.mp4 (30.97 MB)
MP4
2 16 Custom Scan Profiles Part 2 - NM.mp4 (50.53 MB)
MP4
2 2 Installing Nmap on Linux - NM.mp4 (36.49 MB)
MP4
2 3 Installing Nmap on Mac - NM.mp4 (44.7 MB)
MP4
2 4 Kali Linux - A Hacker's Best Friend - NM.mp4 (22.85 MB)
MP4
2 5 Kali Linux Lab - Running it Live - NM.mp4 (46.33 MB)
MP4
2 6 Removing Nmap from Windows - NM.mp4 (32.43 MB)
MP4
2 7 Removing Nmap from Linux - NM.mp4 (12.41 MB)
MP4
2 8 Removing Nmap from Mac - NM.mp4 (16.47 MB)
MP4
2 9 Getting Help - NM.mp4 (60.2 MB)
MP4
3 1 IPv4 for Nmap - NM.mp4 (25.1 MB)
MP4
3 2 IP, TCP, UDP, and ICMP Headers - NM.mp4 (53.23 MB)
MP4
3 3 Nmap and Wireshark Part 1 - NM.mp4 (44.15 MB)
MP4
3 4 Nmap and Wireshark Part 2 - NM.mp4 (85.46 MB)
MP4
3 5 Nmap & IPv6 - NM.mp4 (22.65 MB)
MP4
4 1 Target Specification Review+ - NM.mp4 (19.46 MB)
MP4
4 10 TCP & UDP Port Scanning Lab Part 2.mp4 (35.96 MB)
MP4
4 11 Service and Application Version Detection Part 1 - NM.mp4 (69.15 MB)
MP4
4 12 Service and Application Version Detection Part 2 - NM.mp4 (44.5 MB)
MP4
4 13 Operating System Detection and Fingerprinting Part 1 - NM.mp4 (34.01 MB)
MP4
4 14 Operating System Detection and Fingerprinting Part 2 - NM.mp4 (74.57 MB)
MP4
4 15 NSE, Vulnerability Testing & Exploitation Part 1 - NM.mp4 (26.54 MB)
MP4
4 16 NSE, Vulnerability Testing & Exploitation Part 2 - NM.mp4 (63.31 MB)
MP4
4 17 NSE, Vulnerability Testing & Exploitation - NM.mp4 (40.3 MB)
MP4
4 18 Timing and Performance Part 1 - NM.mp4 (23.43 MB)
MP4
4 19 Timing and Performance Part 2 - NM.mp4 (31.43 MB)
MP4
4 2 Target Specification Lab Part 1 - NM.mp4 (39.8 MB)
MP4
4 3 Target Specification Lab Part 2 - NM.mp4 (29.85 MB)
MP4
4 4 Scan Techniques - NM.mp4 (40.34 MB)
MP4
4 5 Scan Techniques Lab - NM.mp4 (56.18 MB)
MP4
4 6 Host Discovery Part 1 - NM.mp4 (37.27 MB)
MP4
4 7 Host Discovery Part 2 - NM.mp4 (37.83 MB)
MP4
4 8 TCP & UDP Port Scanning - NM.mp4 (33.01 MB)
MP4
4 9 TCP & UDP Port Scanning Lab Part 1 - NM.mp4 (30.04 MB)
MP4
1 1 Introduction.mp4 (8.75 MB)
MP4
1 2 Introduction to Social Engineering Part 1.mp4 (17.29 MB)
MP4
1 3 Introduction to Social Engineering Part 2.mp4 (17.17 MB)
MP4
2 1 Phishing Lab Overview.mp4 (6.93 MB)
MP4
2 2 EC-Council Certified Ethical Hacker v10 Social Engineering Lab Overview.mp4 (9.51 MB)
MP4
3 1 Conclusion.mp4 (6.1 MB)
MP4
1 1 Intro-Instructor Welcome and Objectives(KL).mp4 (4.15 MB)
MP4
1 2 Intro-Disclaimer(KL).mp4 (5.92 MB)
MP4
2 1 The Beginning (KL).mp4 (21.88 MB)
MP4
2 2 Getting Kali up and Running (KL).mp4 (21.99 MB)
MP4
2 3 Moving Around (KL).mp4 (41.7 MB)
MP4
2 4 Module Summary (KL).mp4 (2.87 MB)
MP4
3 1 The Terminal (KL).mp4 (32.78 MB)
MP4
3 2 File System (KL).mp4 (26.84 MB)
MP4
3 3 Useful Commands (KL).mp4 (35.94 MB)
MP4
3 4 Summary (KL).mp4 (3.98 MB)
MP4
4 1 Basic Network Commands (KL).mp4 (32.34 MB)
MP4
4 2 Services (KL).mp4 (22.27 MB)
MP4
4 3 Managing Users (KL).mp4 (12.94 MB)
MP4
4 4 Summary (KL).mp4 (3.02 MB)
MP4
5 1 Troubleshooting Basics (KL).mp4 (31.22 MB)
MP4
5 2 The Tools Chest (KL).mp4 (25.25 MB)
MP4
5 3 Summary (KL).mp4 (1.76 MB)
MP4
1 1 Introduction.mp4 (17.13 MB)
MP4
1 2 Recon.mp4 (22.62 MB)
MP4
1 3 The Harvester.mp4 (28.82 MB)
MP4
1 4 Recon-NG.mp4 (16.22 MB)
MP4
1 5 Using Recon-NG.mp4 (19.03 MB)
MP4
1 6 Scanning With Recon-NG.mp4 (43.56 MB)
MP4
2 1 Common Phishing Techniques.mp4 (15.77 MB)
MP4
2 2 Time to Go Phishing.mp4 (12.18 MB)
MP4
3 1 Social Engineer's Toolkit (SET).mp4 (22 MB)
MP4
3 2 Attacking With SET.mp4 (25.55 MB)
MP4
3 3 Watching the Attack.mp4 (26.31 MB)
MP4
4 1 Stopping Phishing Attacks.mp4 (18.43 MB)
MP4
4 2 Conclusion.mp4 (13.46 MB)
MP4
1 1 Course Introduction.mp4 (18.69 MB)
MP4
1 2 Introduction to the CEH Certification.mp4 (40.53 MB)
MP4
2 1 Fundamental Security Concepts.mp4 (19.28 MB)
MP4
2 2 Information Security Threats and Attacks.mp4 (14.3 MB)
MP4
2 3 Introduction to Ethical Hacking.mp4 (15.97 MB)
MP4
2 4 Introduction to the Cyber Kill Chain.mp4 (17.18 MB)
MP4
2 5 Introduction to Security Controls.mp4 (10.35 MB)
MP4
2 6 Introduction to Security Laws and Standards.mp4 (17.81 MB)
MP4
3 1 Introduction to Footprinting.mp4 (11.92 MB)
MP4
3 10 Banner Grabbing (Demo).mp4 (15.92 MB)
MP4
3 11 theHarvester (Demo).mp4 (12.89 MB)
MP4
3 12 Footprinting Countermeasures.mp4 (13.72 MB)
MP4
3 2 Website Footprinting.mp4 (9.86 MB)
MP4
3 3 DNS Footprinting.mp4 (7.01 MB)
MP4
3 4 HTTrack (Demo).mp4 (25.9 MB)
MP4
3 5 Shodan (Demo).mp4 (26.22 MB)
MP4
3 6 Google Hacking Database (Demo).mp4 (8.88 MB)
MP4
3 7 LinkedIn (Demo).mp4 (18 MB)
MP4
3 8 Job Boards (Demo).mp4 (35.13 MB)
MP4
3 9 whois (Demo).mp4 (11.22 MB)
MP4
4 1 Introduction to Network Scanning.mp4 (37.21 MB)
MP4
4 2 Ping Command (Demo).mp4 (6.87 MB)
MP4
4 3 NMAP (Demo).mp4 (51.82 MB)
MP4
4 4 Hping3 (Demo).mp4 (20.86 MB)
MP4
4 5 Introduction to Enumeration.mp4 (17.71 MB)
MP4
4 6 Enumeration Countermeasures.mp4 (8.02 MB)
MP4
4 7 SMB Enumeration (Demo).mp4 (10.54 MB)
MP4
4 8 NetBIOS Enumeration (Demo).mp4 (9.3 MB)
MP4
4 9 DNS Enumeration (Demo).mp4 (14.75 MB)
MP4
5 1 Introduction to Vulnerabilities.mp4 (18.44 MB)
MP4
5 10 Malware - Types of Viruses.mp4 (12.79 MB)
MP4
5 11 Malware - Worms.mp4 (6.83 MB)
MP4
5 12 Detecting Malware.mp4 (16.63 MB)
MP4
5 13 Malware Countermeasures.mp4 (7.85 MB)
MP4
5 2 Vulnerability Assessment Phases and Tools.mp4 (18.54 MB)
MP4
5 3 Types of Password Attacks and Defenses.mp4 (12.63 MB)
MP4
5 4 Password Cracking with Medusa (Demo).mp4 (27.09 MB)
MP4
5 5 Privilege Escalation.mp4 (9.92 MB)
MP4
5 6 Malware - Keyloggers.mp4 (12.31 MB)
MP4
5 7 Malware - Rootkits.mp4 (24.77 MB)
MP4
5 8 Malware - Trojans.mp4 (20.29 MB)
MP4
5 9 Malware - Introduction to Viruses.mp4 (10.15 MB)
MP4
6 1 Introduction to Sniffing.mp4 (6.98 MB)
MP4
6 10 Introduction to Session Hijacking.mp4 (15.11 MB)
MP4
6 11 Network Level Session Hijacking.mp4 (20.1 MB)
MP4
6 12 IDS and Firewall Evasion Techniques.mp4 (9 MB)
MP4
6 13 WAF Detection with WAFW00F (Demo).mp4 (7.13 MB)
MP4
6 14 Gaining Remote Access (Demo).mp4 (13.62 MB)
MP4
6 2 Sniffing Attacks.mp4 (16.77 MB)
MP4
6 3 Sniffing Tools.mp4 (13.19 MB)
MP4
6 4 Sniffing Countermeasures.mp4 (8.71 MB)
MP4
6 5 Introduction to Social Engineering.mp4 (37.93 MB)
MP4
6 6 Social Engineering Countermeasures.mp4 (29.88 MB)
MP4
6 7 Introduction to DoS and DDoS Attacks.mp4 (10.78 MB)
MP4
6 8 Types of DoS and DDoS Attacks.mp4 (32.41 MB)
MP4
6 9 DDoS Tools and Countermeasures.mp4 (22.94 MB)
MP4
7 1 Web Server Attack Methodology.mp4 (17.24 MB)
MP4
7 2 Types of Web Server Attacks and Countermeasures.mp4 (36.29 MB)
MP4
7 3 Web Application Threats.mp4 (25.27 MB)
MP4
7 4 Web Application Hacking Methodology.mp4 (10.57 MB)
MP4
7 5 Introduction to SQL Injection Attacks.mp4 (15.18 MB)
MP4
7 6 Command Injection Attack (Demo).mp4 (20.35 MB)
MP4
7 7 Web Attack Countermeasures.mp4 (17.76 MB)
MP4
8 1 Introduction to Wireless.mp4 (12.29 MB)
MP4
8 2 Wireless Attacks and Countermeasures.mp4 (8.26 MB)
MP4
9 1 OWASP Top 10 for Mobile.mp4 (16.26 MB)
MP4
9 2 Mobile Attacks and Countermeasures.mp4 (11.5 MB)
MP4
10 1 Introduction to IoT Hacking.mp4 (11.39 MB)
MP4
10 2 IoT Communication Models and Operating Systems.mp4 (13.17 MB)
MP4
10 3 IoT Attacks and Threats.mp4 (11.48 MB)
MP4
10 4 IoT Attack Countermeasures.mp4 (12.86 MB)
MP4
10 5 OT Concepts.mp4 (13.72 MB)
MP4
10 6 OT Attacks and Countermeasures.mp4 (12.22 MB)
MP4
11 1 Introduction to Cloud Environments.mp4 (15.37 MB)
MP4
11 2 Cloud Computing Services.mp4 (12.37 MB)
MP4
11 3 Benefits of Cloud Computing.mp4 (13.29 MB)
MP4
11 4 Cloud Threats and Attacks.mp4 (10.57 MB)
MP4
11 5 Cloud Security Considerations.mp4 (10.59 MB)
MP4
12 1 Introduction to Cryptography.mp4 (6.64 MB)
MP4
12 2 Hashing, Digital Certificates and Digital Signatures.mp4 (26.44 MB)
MP4
12 3 Cryptography Attacks and Countermeasures.mp4 (13.44 MB)
MP4
13 1 Conclusion.mp4 (7.21 MB)
MP4
1 1 Password Cracking Foundations.mp4 (20.03 MB)
MP4
1 2 John the Ripper Introduction.mp4 (21.97 MB)
MP4
1 3 John the Ripper Demonstration.mp4 (15.65 MB)
MP4
1 4 Hash Suite.mp4 (11.72 MB)
MP4
1 5 Cain and Abel.mp4 (33.36 MB)
MP4
1 6 Securing Your Password.mp4 (10.85 MB)
MP4
1 1 Introduction.mp4 (8.91 MB)
MP4
2 1 Wireshark Lab Part 1.mp4 (40.22 MB)
MP4
2 10 TCPDUMP Lab.mp4 (50.25 MB)
MP4
2 2 Wireshark Lab Part 2.mp4 (46.83 MB)
MP4
2 3 Wireshark Lab Part 3.mp4 (36.94 MB)
MP4
2 5 Packet Sniffing Lab Part 1.mp4 (44.43 MB)
MP4
2 6 Packet Sniffing Lab Part 2.mp4 (22.62 MB)
MP4
2 8 Applying Filters to TCPDUMP and Wireshark Lab Part 1.mp4 (52.96 MB)
MP4
2 9 Applying Filters to TCPDUMP and Wireshark Lab Part 2.mp4 (76.18 MB)
MP4
3 1 Capstone Lab Navigation.mp4 (7.58 MB)
MP4
3 2 Conclusion.mp4 (6.72 MB)
MP4
1 1 Introduction.mp4 (18.31 MB)
MP4
1 10 Best Practices.mp4 (54.7 MB)
MP4
1 11 Best Practices.mp4 (39.48 MB)
MP4
1 12 Environment Setup.mp4 (49.56 MB)
MP4
1 2 Tools.mp4 (52.92 MB)
MP4
1 3 Packets.mp4 (67.41 MB)
MP4
1 4 HTTP Basics.mp4 (67.97 MB)
MP4
1 5 Why Sites Get Hacked.mp4 (43.26 MB)
MP4
1 6 Why Sites Get Hacked.mp4 (58.91 MB)
MP4
1 7 Why Sites Get Hacked.mp4 (52.77 MB)
MP4
1 8 Why Sites Get Hacked.mp4 (47.26 MB)
MP4
1 9 Why Sites Get Hacked.mp4 (24.55 MB)
MP4
2 1 What is SQL Injection.mp4 (63.74 MB)
MP4
2 10 Discovering SQLI.mp4 (18.71 MB)
MP4
2 11 Discovering SQLI.mp4 (38.9 MB)
MP4
2 12 Exploiting SQLI.mp4 (15.67 MB)
MP4
2 13 Exploiting SQLI.mp4 (21.29 MB)
MP4
2 14 Exploiting SQLI.mp4 (20.88 MB)
MP4
2 15 Exploiting SQLI.mp4 (23.26 MB)
MP4
2 16 SQLI Lab.mp4 (9.57 MB)
MP4
2 2 Spidering.mp4 (24.47 MB)
MP4
2 3 Spidering.mp4 (19.4 MB)
MP4
2 4 Spidering.mp4 (17.12 MB)
MP4
2 5 Spidering.mp4 (14.9 MB)
MP4
2 6 Discovering SQLI.mp4 (18.24 MB)
MP4
2 7 Discovering SQLI.mp4 (23.94 MB)
MP4
2 8 Discovering SQLI.mp4 (43.07 MB)
MP4
2 9 Discovering SQLI.mp4 (15.39 MB)
MP4
3 1 What is XSS.mp4 (69.45 MB)
MP4
3 10 Exploiting XSS.mp4 (56.83 MB)
MP4
3 11 XSS Lab.mp4 (10.68 MB)
MP4
3 2 What is XSS.mp4 (24.53 MB)
MP4
3 3 Discovering XSS.mp4 (16.68 MB)
MP4
3 4 Discovering XSS.mp4 (17.17 MB)
MP4
3 5 Discovering XSS.mp4 (13.75 MB)
MP4
3 6 Discovering XSS.mp4 (25.63 MB)
MP4
3 7 Discovering XSS.mp4 (21.07 MB)
MP4
3 8 Discovering XSS.mp4 (5.51 MB)
MP4
3 9 Exploiting XSS.mp4 (38.74 MB)
MP4
4 1 LFI & RFI.mp4 (19.96 MB)
MP4
4 2 LFI & RFI.mp4 (21.89 MB)
MP4
4 3 LFI & RFI.mp4 (25.29 MB)
MP4
4 4 LFI & RFI Lab.mp4 (14.77 MB)
MP4
5 1 Report Creation.mp4 (58.4 MB)
MP4
5 2 Report Creation.mp4 (37.32 MB)
MP4
5 3 Wrap Up.mp4 (10.97 MB)
MP4
1 1 Course Introduction and Objectives.mp4 (6.67 MB)
MP4
2 1 Burp Suite Configuration and Interface Overview.mp4 (11.16 MB)
MP4
3 1 Crawling, Scope, and Auditing (Performing the Scan).mp4 (23.09 MB)
MP4
4 1 Scan Review and Conclusion.mp4 (37.9 MB)
MP4
1 1 Linux (part 1).mp4 (2.64 MB)
MP4
1 2 Linux (part 2) Kali Linux Commands.mp4 (34.68 MB)
MP4
1 3 Linux (part 3) - Directories, myfile and Nano.mp4 (32.72 MB)
MP4
1 4 Linux (part 4) chmod, manipulation and packages.mp4 (37.8 MB)
MP4
1 5 Linux (part 5) IP Addressing and netcat.mp4 (49.01 MB)
MP4
1 6 Linux (part 6) Copy Commands and crontab.mp4 (17.67 MB)
MP4
10 1 Post Exploitation (part 1) File Transfer without and Interactive Shell.mp4 (57.73 MB)
MP4
10 2 Post Exploitation (part 2) Exploit Development.mp4 (57.56 MB)
MP4
10 3 Post Exploitation (part 3) Pivoting.mp4 (26.56 MB)
MP4
10 4 Post Exploitation (part 4) Setting Up a Domain Controller.mp4 (37.85 MB)
MP4
11 1 WebApp Introduction (part 1) Web App Testing.mp4 (2.93 MB)
MP4
11 2 WebApp (part 2) Vulnerable Web Applications.mp4 (34.08 MB)
MP4
11 3 WebApp (part 3) SQL Injection.mp4 (48.16 MB)
MP4
11 4 WebApp (part 4) File Inclusion.mp4 (21.24 MB)
MP4
11 5 WebApp (part 5) Cross Site Scripting XSS.mp4 (20.78 MB)
MP4
12 1 Exploit Development Introduction (part 1).mp4 (2.69 MB)
MP4
12 10 Exploit Development (part 10) Creating Shell Code in Kali Linux.mp4 (57.76 MB)
MP4
12 11 Exploit Development (part 11) Fuzzing.mp4 (54.57 MB)
MP4
12 12 Exploit Development (part 12) Public Exploits and Perl.mp4 (60.38 MB)
MP4
12 13 Exploit Development (part 13) Turning a 3Com Exploit into a Metasploit Module.mp4 (57.46 MB)
MP4
12 14 Exploit Development (part 14) Structured Exception Handler Over-Write.mp4 (144.49 MB)
MP4
12 2 Exploit Development (part 2) A Program in Memory.mp4 (25.24 MB)
MP4
12 3 Exploit Development (part 3) Stack Frame for Function.mp4 (14.73 MB)
MP4
12 4 Exploit Development (part 4) GNU Compilers.mp4 (55.94 MB)
MP4
12 5 Exploit Development (part 5) Python.mp4 (26.34 MB)
MP4
12 6 Exploit Development (part 6) Executing Unintended Code.mp4 (41.52 MB)
MP4
12 7 Exploit Development (part 7) Network Based Exploits and Debuggers.mp4 (47.64 MB)
MP4
12 8 Exploit Development (part 8) Creating a Cyclic Pattern.mp4 (87.83 MB)
MP4
12 9 Exploit Development (part 9) Verifying Offsets.mp4 (76.11 MB)
MP4
13 1 SPF Introduction (part 1).mp4 (3.1 MB)
MP4
13 2 SPF (part 2) Attach to Smartphone Based Apps.mp4 (11.61 MB)
MP4
13 3 SPF (part 3) Turning an Android App into a SPF Agent.mp4 (22.43 MB)
MP4
13 4 SPF (part 4) Functionality for Agents.mp4 (22.24 MB)
MP4
13 5 SPF (part 5) Pentesting Mobile Devices.mp4 (45.89 MB)
MP4
2 1 Programming (part 1) Fundamentals for Pen Testers.mp4 (2.67 MB)
MP4
2 2 Programming (part 2) Bash Scripting and If Then Command.mp4 (25 MB)
MP4
2 3 Programming (part 3) Network Pings.mp4 (23.98 MB)
MP4
2 4 Programming (part 4) Python for Port Scanning.mp4 (32.99 MB)
MP4
2 5 Programming (part 5) Python Import Command.mp4 (27.81 MB)
MP4
3 1 Metasploit (part 1) Introduction.mp4 (2.83 MB)
MP4
3 2 Metasploit (part 2) Fundamentals.mp4 (44.6 MB)
MP4
3 3 Metasploit (part 3) Operation.mp4 (69.98 MB)
MP4
3 4 Metasploit (part 4) Auxiliary Module.mp4 (13.57 MB)
MP4
3 5 Metasploit (part 5) msfcli.mp4 (24.03 MB)
MP4
3 6 Metasploit (part 6) msfvenom.mp4 (36.43 MB)
MP4
4 1 Information Gathering Intro (part 1).mp4 (2.47 MB)
MP4
4 2 Information Gathering (part 2) Domain Name Services.mp4 (41.06 MB)
MP4
4 3 Information Gathering (part 3) Targeting Email and Maltego.mp4 (54.55 MB)
MP4
4 4 Information Gathering (part 4) recon-ng and google operators.mp4 (17.91 MB)
MP4
4 5 Information Gathering (part 5) NMAP and PortScanning.mp4 (98.02 MB)
MP4
5 1 Vulnerability Scanning Intro (part 1).mp4 (2.12 MB)
MP4
5 2 Vulnerability Scanning (part 2) Nessus.mp4 (42.37 MB)
MP4
5 3 Vulnerability Scanning (part 3) Nmap Scripting Engine.mp4 (32.48 MB)
MP4
5 4 Vulnerability Scanning (part 4) Metasploit.mp4 (28.28 MB)
MP4
5 5 Vulnerability Scanning (part 5) WebApp, XAMPP, WEBDAV, nikto.mp4 (37.79 MB)
MP4
5 6 Vulnerability Scanning (part 6) Directory Transversals.mp4 (22.42 MB)
MP4
6 1 Traffic Capture Introduction (part 1).mp4 (2.53 MB)
MP4
6 2 Traffic Capture (part 2) Analyzing Network Protocol with Wireshark.mp4 (29.29 MB)
MP4
6 3 Traffic Capture (part 3) Address Resolution Protocol ARP.mp4 (39.5 MB)
MP4
6 4 Traffic Capture (part 4) DNS.mp4 (13.33 MB)
MP4
6 5 Traffic Capture (part 5) ettercap.mp4 (41.97 MB)
MP4
6 6 Traffic Capture (part 6) SSL Stripping.mp4 (34.89 MB)
MP4
7 1 Exploitation (part 1) Direct Exploitation.mp4 (46.91 MB)
MP4
7 2 Exploitation (part 2) SQL Commands.mp4 (35.9 MB)
MP4
7 3 Exploitation (part 3) Directory Traversal.mp4 (19.46 MB)
MP4
7 4 Exploitation (part 4) Open Source Vulnerability.mp4 (20.55 MB)
MP4
7 5 Exploitation (part 5) Using Backdoor to Access an FTP Server.mp4 (20.72 MB)
MP4
7 6 Exploitation (part 6) Attaching to an IP Address.mp4 (18.76 MB)
MP4
8 1 Passwords (part 1) Password Attacks.mp4 (45.71 MB)
MP4
8 2 Passwords (part 2) Online Password Cracking.mp4 (17.54 MB)
MP4
8 3 Passwords (part 3) Offline Password Attacks.mp4 (46.39 MB)
MP4
8 4 Passwords (part 4) Using oclhashcat.mp4 (58.3 MB)
MP4
9 1 Advanced Exploitation (part 1) Introduction.mp4 (2.53 MB)
MP4
9 2 Advanced Exploitation (part 2) Client Side Attacks.mp4 (36.33 MB)
MP4
9 3 Advanced Exploitation (part 3) Exploiting Java.mp4 (18.68 MB)
MP4
9 4 Advanced Exploitation (part 4) Social Engineering.mp4 (68.83 MB)
MP4
9 5 Advanced Exploitation (part 5) Bypassing Antivirus Software.mp4 (64.19 MB)
MP4
1 1 Unicornscan (BSWR).mp4 (42.73 MB)
MP4
1 1 Course Overview.mp4 (38.18 MB)
MP4
2 1 Understanding the Penetration Test Report.mp4 (41 MB)
MP4
2 2 Penetration Test Report Demo.mp4 (22.11 MB)
MP4
2 3 Note Taking and Mind Mapping.mp4 (29.7 MB)
MP4
2 4 Finding Resources to Prepare for the Offensive Penetration Testing.mp4 (27.12 MB)
MP4
3 1 Setting up the Kali Linux VM.mp4 (52.09 MB)
MP4
3 2 Overview of Tools in Kali Linux.mp4 (51.93 MB)
MP4
3 3 Understanding the Command Line.mp4 (29.98 MB)
MP4
3 4 Who, What, When, Where and How of the Linux Command Line.mp4 (19.56 MB)
MP4
3 5 Windows Command Lab.mp4 (19.9 MB)
MP4
3 6 Command Line Lab.mp4 (4.07 MB)
MP4
3 7 Command Line Lab Walkthrough.mp4 (25.82 MB)
MP4
4 1 Scanning Network Protocols.mp4 (19.27 MB)
MP4
4 10 NFS Enumeration.mp4 (36.63 MB)
MP4
4 11 SMTP Enumeration.mp4 (25.94 MB)
MP4
4 12 SNMP Enumeration.mp4 (19.65 MB)
MP4
4 13 FTP Enumeration.mp4 (13.9 MB)
MP4
4 14 FTP Enumeration Demo.mp4 (40.48 MB)
MP4
4 15 SSH Enumeration.mp4 (55.06 MB)
MP4
4 16 Protocol Tips.mp4 (19.58 MB)
MP4
4 17 Network Protocols Lab.mp4 (2.8 MB)
MP4
4 2 Scanning with Nmap.mp4 (32.66 MB)
MP4
4 3 Scanning with Masscan.mp4 (28.26 MB)
MP4
4 4 Scanning with Netcat.mp4 (47.9 MB)
MP4
4 5 Using Wireshark.mp4 (18.55 MB)
MP4
4 6 Wireshark and Encrypted Traffic.mp4 (22.37 MB)
MP4
4 7 Weaponizing Wireshark.mp4 (31.06 MB)
MP4
4 8 SMB Enumeration.mp4 (26.37 MB)
MP4
4 9 SMB Enumeration Demo.mp4 (57.9 MB)
MP4
5 1 Web Application Enumeration.mp4 (76.35 MB)
MP4
5 10 File Upload Vulnerabilities.mp4 (19.57 MB)
MP4
5 11 XXE Attacks.mp4 (43.46 MB)
MP4
5 12 Content Management Systems.mp4 (27.31 MB)
MP4
5 13 Content Management Systems Demo.mp4 (61.01 MB)
MP4
5 14 Web Application Lab.mp4 (1.24 MB)
MP4
5 15 Web Application Lab Walkthrough.mp4 (102.21 MB)
MP4
5 2 Using Intercepting Proxies Part 1.mp4 (31.45 MB)
MP4
5 3 Using Intercepting Proxies Part 2.mp4 (49.37 MB)
MP4
5 4 SQL Injections.mp4 (44.18 MB)
MP4
5 5 SQL Injection Authentication Bypass.mp4 (19.29 MB)
MP4
5 6 Cross-Site Scripting (XSS).mp4 (28.86 MB)
MP4
5 7 BeEF Framework Demo.mp4 (32.2 MB)
MP4
5 8 File Inclusion Vulnerabilities.mp4 (28.8 MB)
MP4
5 9 File Inclusion Demo.mp4 (30.43 MB)
MP4
6 1 How to Practice Buffer Overflows.mp4 (12.82 MB)
MP4
6 2 Setting up the Environment.mp4 (27.55 MB)
MP4
6 3 Fuzzing the Application.mp4 (50.76 MB)
MP4
6 4 Finding Bad Characters.mp4 (22.74 MB)
MP4
6 5 Finding the Return Address.mp4 (33.21 MB)
MP4
6 6 Getting a Shell.mp4 (27.37 MB)
MP4
6 7 Buffer Overflow Lab.mp4 (21.82 MB)
MP4
7 1 Where to Look for Public Exploits.mp4 (29.3 MB)
MP4
7 2 Understanding the Code.mp4 (24.16 MB)
MP4
7 3 Modifying the Code to Fit the Environment.mp4 (44.79 MB)
MP4
7 4 Introduction to Metasploit.mp4 (65.15 MB)
MP4
7 5 Using Metasploit or Not.mp4 (21.59 MB)
MP4
7 6 Public Exploit Lab.mp4 (1.66 MB)
MP4
7 7 Public Exploit Lab Walkthrough.mp4 (46.65 MB)
MP4
8 1 The Different Types of Shells.mp4 (39.94 MB)
MP4
8 2 How to Upgrade a Shell.mp4 (27.27 MB)
MP4
8 3 Transferring Files to and from Kali Linux.mp4 (22.6 MB)
MP4
8 4 Transferring Files Demo.mp4 (55.09 MB)
MP4
9 1 Linux Privilege Escalation.mp4 (24.19 MB)
MP4
9 2 Windows Privilege Escalation.mp4 (39.23 MB)
MP4
9 3 A Word on Privilege Escalation Enumeration Scripts.mp4 (15.72 MB)
MP4
9 4 Privilege Escalation Lab.mp4 (4.33 MB)
MP4
9 5 Privilege Escalation Walkthrough - Windows.mp4 (70.68 MB)
MP4
9 6 Privilege Escalation Walkthrough - Linux.mp4 (42.51 MB)
MP4
10 1 Introduction to Password Cracking Tools.mp4 (24.07 MB)
MP4
10 2 Introduction to Login Brute-Forcing Tools.mp4 (11.83 MB)
MP4
10 3 Password Brute-Forcing Web Logins.mp4 (47.49 MB)
MP4
10 4 Password Brute-Forcing Tips.mp4 (64.01 MB)
MP4
10 5 Brute-Force and Password Cracking Lab.mp4 (1.89 MB)
MP4
10 6 Brute-Force and Password Cracking Lab Walkthrough.mp4 (77.51 MB)
MP4
11 1 Hands-on Penetration Test Lab.mp4 (937.64 KB)
MP4
11 2 Hands-on Penetration Test Lab Walkthrough.mp4 (70.45 MB)
MP4
11 3 Writing the Report.mp4 (23.51 MB)
MP4
12 1 Understanding the Hacker Mindset.mp4 (20.17 MB)
MP4
12 2 Tips on Harnessing the Hacker Mindset.mp4 (19.52 MB)
MP4
1 1 What is the Penetration Testing Execution Standard (PTES).mp4 (93.64 MB)
MP4
1 10 Scoping Meeting Part 1.mp4 (25.18 MB)
MP4
1 11 Scoping Meeting Part 2.mp4 (32.77 MB)
MP4
1 12 Additional Support Part 1.mp4 (30.58 MB)
MP4
1 13 Additional Support Part 2.mp4 (35.44 MB)
MP4
1 14 PTES Questionnaires Part 1.mp4 (24.82 MB)
MP4
1 15 PTES Questionnaires Part 2.mp4 (32.93 MB)
MP4
1 16 Scope Creep.mp4 (33.54 MB)
MP4
1 17 Start and End Dates.mp4 (38.6 MB)
MP4
1 18 Specify IP Ranges and Domains.mp4 (47.92 MB)
MP4
1 19 Dealing With Third Parties.mp4 (53.28 MB)
MP4
1 2 Who and Why.mp4 (34.46 MB)
MP4
1 20 Define Acceptable Sociable Engineering Pretexts Part 1.mp4 (33.45 MB)
MP4
1 21 Define Acceptable Sociable Engineering Pretexts Part 2.mp4 (23.57 MB)
MP4
1 22 DoS Testing.mp4 (27.3 MB)
MP4
1 23 Payment Terms Part 1.mp4 (42.71 MB)
MP4
1 24 Payment Terms Part 2.mp4 (17.05 MB)
MP4
1 25 Goals.mp4 (26.42 MB)
MP4
1 26 Establish Lines of Communication Part 1.mp4 (27.9 MB)
MP4
1 27 Establishing Lines of Communication Part 2.mp4 (29.15 MB)
MP4
1 28 Rules of Engagement Part 1.mp4 (46.3 MB)
MP4
1 29 Rules of Engagement Part 2.mp4 (19.74 MB)
MP4
1 3 Course Use.mp4 (60.05 MB)
MP4
1 30 Capabilities and Technology in Place.mp4 (37.91 MB)
MP4
1 31 Module 1 Summary.mp4 (16.74 MB)
MP4
1 4 Pre-Engagement Interactions Overview Part 1.mp4 (19.06 MB)
MP4
1 5 Pre-Engagement Interactions Overview Part 2.mp4 (31.68 MB)
MP4
1 6 Introduction to Scope Part 1.mp4 (32.02 MB)
MP4
1 7 Introduction to Scope Part 2.mp4 (21.55 MB)
MP4
1 8 Metrics for Time Estimation Part 1.mp4 (34.22 MB)
MP4
1 9 Metrics for Time Estimation Part 2.mp4 (23.13 MB)
MP4
2 1 Intelligence Gathering Overview.mp4 (6.62 MB)
MP4
2 10 Footprinting - External.mp4 (26.33 MB)
MP4
2 11 Footprinting - Internal.mp4 (22.22 MB)
MP4
2 12 Identity Protection Mechanisms.mp4 (15.41 MB)
MP4
2 13 Module 2 Summary.mp4 (8.46 MB)
MP4
2 2 General Background Concepts.mp4 (56.66 MB)
MP4
2 3 Business Asset Analyst.mp4 (27.98 MB)
MP4
2 4 Intelligence Gathering Basics.mp4 (18.55 MB)
MP4
2 5 Target Selection.mp4 (35.27 MB)
MP4
2 6 OSINT Part 1.mp4 (38.05 MB)
MP4
2 7 OSINT Part 2.mp4 (26.62 MB)
MP4
2 8 OSINT Part 3.mp4 (20.77 MB)
MP4
2 9 Covert Gathering.mp4 (18.94 MB)
MP4
3 1 Threat Modeling Overview.mp4 (5.47 MB)
MP4
3 2 General - Modeling Process.mp4 (24.78 MB)
MP4
3 3 Business Asset Analysis.mp4 (27.89 MB)
MP4
3 4 Business Process Analysis.mp4 (22.93 MB)
MP4
3 5 Threat Agent or Community Analysis.mp4 (19.88 MB)
MP4
3 6 Threat Capability Analysis.mp4 (20.58 MB)
MP4
3 7 Motivation Modeling.mp4 (9.11 MB)
MP4
3 8 Finding Relevant News.mp4 (16.43 MB)
MP4
3 9 Module 3 Summary.mp4 (6.75 MB)
MP4
4 1 Vulnerability Analysis Overview.mp4 (4.71 MB)
MP4
4 2 Vulnerability Testing.mp4 (23.56 MB)
MP4
4 3 Active Testing.mp4 (30.32 MB)
MP4
4 4 Passive Testing.mp4 (15.16 MB)
MP4
4 5 Validation.mp4 (30.52 MB)
MP4
4 6 Research.mp4 (30.34 MB)
MP4
4 7 Module 4 Summary.mp4 (5.11 MB)
MP4
5 1 Exploitation Overview.mp4 (5.56 MB)
MP4
5 10 Module 5 Summary.mp4 (6.57 MB)
MP4
5 2 Purpose.mp4 (21.59 MB)
MP4
5 3 Countermeasures.mp4 (26.43 MB)
MP4
5 4 Evasion.mp4 (18.49 MB)
MP4
5 5 Precision Strike.mp4 (12.35 MB)
MP4
5 6 Customized Exploitation Avenue.mp4 (23.02 MB)
MP4
5 7 Zero Day Angle.mp4 (22.11 MB)
MP4
5 8 Example Avenues of Attack.mp4 (19.15 MB)
MP4
5 9 Overall Objectives.mp4 (11.22 MB)
MP4
6 1 Post-Exploitation Overview.mp4 (4.82 MB)
MP4
6 10 Further Penetration Into Infrastructure.mp4 (9.79 MB)
MP4
6 11 Cleanup.mp4 (8.54 MB)
MP4
6 12 Module 6 Summary.mp4 (7.74 MB)
MP4
6 2 Purpose.mp4 (10.27 MB)
MP4
6 3 Rules of Engagement - Post-Exploitation.mp4 (15.75 MB)
MP4
6 4 Infrastructure Analysis.mp4 (20.03 MB)
MP4
6 5 Pillaging Part 1.mp4 (25.61 MB)
MP4
6 6 Pillaging Part 2.mp4 (16.42 MB)
MP4
6 7 High Value or Profile Targets.mp4 (13.73 MB)
MP4
6 8 Data Infiltration.mp4 (13.1 MB)
MP4
6 9 Persistence.mp4 (12.12 MB)
MP4
7 1 Reporting Overview.mp4 (2.65 MB)
MP4
7 2 Reporting Structure.mp4 (6.14 MB)
MP4
7 3 The Executive Summary.mp4 (25.02 MB)
MP4
7 4 Technical Support.mp4 (24.88 MB)
MP4
7 5 Module 7 Summary.mp4 (4.1 MB)
MP4
8 1 Course Summary.mp4 (6.53 MB)
MP4






Join to our telegram Group
Information
Users of Guests are not allowed to comment this publication.
Choose Site Language
Keep downtopc Online Please

PREMIUM ACCOUNTS

Support downtopc by buying or renewing your premium account using below links: