Torrent Info
Title [FreeCoursesOnline.Me] PacktPub - Offensive Hacking Unfolded - Become a Pro Pentester in 2023!
Category
Size 5.11GB

Files List
Please note that this page does not hosts or makes available any of the listed filenames. You cannot download any of those files from here.
1.1 First Target Machine Basic PenTesting 1.html 114B
1.2 Kali Linux Virtual Machine File - OHU.html 133B
1. Bonus Lecture.html 2.10KB
1. Clean Documentation in a Professional Test.mp4 141.06MB
1. Clean Documentation in a Professional Test.srt 32.93KB
1. CMS Hacking - Initial Information Gathering.mp4 111.57MB
1. CMS Hacking - Initial Information Gathering.srt 19.31KB
1. How to go more advanced with this course.html 3.00KB
1. Introduction to the Course - Do Not Skip.mp4 43.77MB
1. Introduction to the Course - Do Not Skip.srt 9.66KB
1. LAB 1 - Exploitation with Metasploit Framework.mp4 258.82MB
1. LAB 1 - Exploitation with Metasploit Framework.srt 42.43KB
1. Lab Setup using the VMware Player.mp4 110.91MB
1. Lab Setup using the VMware Player.srt 17.65KB
1. OneHack.us Premium Cracked Accounts-Tutorials-Guides-Articles Community Based Forum.url 377B
1. Passive Reconnaissance - Part 1.mp4 113.55MB
1. Passive Reconnaissance - Part 1.srt 14.98KB
1. Upcoming Lectures with their Exact Release Date!.html 1.52KB
1. Upcoming Lectures with their Exact Release Date!.html 1.04KB
1. What is a Vulnerability Assessment.html 995B
10. Part 2 Web Server Hacking Risky PUT & DELETE Methods.mp4 120.01MB
10. Part 2 Web Server Hacking Risky PUT & DELETE Methods.srt 18.44KB
10. Privilege Escalation Techniques - Part 3.mp4 55.40MB
10. Privilege Escalation Techniques - Part 3.srt 9.96KB
11. Part 3 Web Server Hacking SSH Brute Forcing w Hydra.mp4 57.67MB
11. Part 3 Web Server Hacking SSH Brute Forcing w Hydra.srt 11.49KB
11. Privilege Escalation Techniques - Part 4.mp4 167.20MB
11. Privilege Escalation Techniques - Part 4.srt 19.93KB
13. Spawning Stable Shells.html 2.28KB
2.1 PenTest Report (OHU).docx 973.79KB
2.2 PenTest Report (OHU).pdf 812.88KB
2. CMS Hacking - Directory Busting and CMS Scanning.mp4 111.49MB
2. CMS Hacking - Directory Busting and CMS Scanning.srt 18.19KB
2. Disclaimer.html 1.62KB
2. FTUApps.com Download Cracked Developers Applications For Free.url 239B
2. Introduction to Virus and Antivirus Software.html 3.10KB
2. LAB 2 - Exploitation using Manual Public Exploits.mp4 224.68MB
2. LAB 2 - Exploitation using Manual Public Exploits.srt 38.96KB
2. Manually Identify, Analyze and Rank Vulnerabilities.mp4 235.22MB
2. Manually Identify, Analyze and Rank Vulnerabilities.srt 33.63KB
2. Passive Reconnaissance - Part 2.mp4 136.69MB
2. Passive Reconnaissance - Part 2.srt 15.97KB
2. Report Writing with Perfect Examples.html 990B
2. Terminal - Few Survival Commands to know (Optional).html 6.49KB
2. The Core of Network Testing - Part 1.mp4 128.80MB
2. The Core of Network Testing - Part 1.srt 21.53KB
2. Unlock your certificate and upgrade your LinkedIn profile using this course!.mp4 16.37MB
2. Unlock your certificate and upgrade your LinkedIn profile using this course!.srt 2.92KB
3. #1 Bypass Antivirus - Making the Base Payload.mp4 65.21MB
3. #1 Bypass Antivirus - Making the Base Payload.srt 14.39KB
3. Automated Vulnerability Assessment using Nessus.mp4 157.38MB
3. Automated Vulnerability Assessment using Nessus.srt 28.92KB
3. CMS Hacking - General Brute Forcing & Exploitation.mp4 237.50MB
3. CMS Hacking - General Brute Forcing & Exploitation.srt 33.91KB
3. Essential Things You Should Know.html 1.13KB
3. Passive Reconnaissance - Part 3.mp4 129.36MB
3. Passive Reconnaissance - Part 3.srt 14.66KB
3. Terminal - Tips and Tricks you should apply now (Optional).html 1.98KB
3. Thankyou for taking this course. What should you expect.html 2.49KB
3. The Core of Network Testing - Part 2.mp4 213.38MB
3. The Core of Network Testing - Part 2.srt 23.19KB
3. What's your next step after doing this course.html 1.23KB
4. #2 Bypass Antivirus - The Actual Evasion Technique!.mp4 221.42MB
4. #2 Bypass Antivirus - The Actual Evasion Technique!.srt 27.50KB
4. Automated Vulnerability Assessment - Nmap & VEGA.mp4 60.38MB
4. Automated Vulnerability Assessment - Nmap & VEGA.srt 12.84KB
4. Do you know the Power of Version Numbers - Part 1.mp4 179.91MB
4. Do you know the Power of Version Numbers - Part 1.srt 24.69KB
4. Store Passive Data in the Right Way.html 3.96KB
4. Thank you very much for completing this course!.mp4 5.38MB
4. Thank you very much for completing this course!.srt 3.07KB
4. The Core of Network Testing - Part 3.mp4 101.37MB
4. The Core of Network Testing - Part 3.srt 14.15KB
4. Theoretical Basics [EXTREMELY IMPORTANT].mp4 184.25MB
4. Theoretical Basics [EXTREMELY IMPORTANT].srt 37.26KB
4. What can you do to get the most out of this course.mp4 36.17MB
4. What can you do to get the most out of this course.srt 6.67KB
5. Active Reconnaissance - Part 1.mp4 87.28MB
5. Active Reconnaissance - Part 1.srt 13.25KB
5. Do you know the Power of Version Numbers - Part 2.mp4 124.75MB
5. Do you know the Power of Version Numbers - Part 2.srt 19.19KB
5. How to get answers to your questions and help with problems.mp4 35.83MB
5. How to get answers to your questions and help with problems.srt 7.07KB
5. Post Exploitation using Metasploit - Part 1.mp4 114.00MB
5. Post Exploitation using Metasploit - Part 1.srt 17.61KB
6. Active Reconnaissance - Part 2.mp4 118.52MB
6. Active Reconnaissance - Part 2.srt 17.40KB
6. Important Specific Vulnerabilities such as SQL Injection in-depth.mp4 194.90MB
6. Important Specific Vulnerabilities such as SQL Injection in-depth.srt 34.90KB
6. Post Exploitation using Metasploit - Part 2.mp4 81.21MB
6. Post Exploitation using Metasploit - Part 2.srt 15.17KB
7. Active Reconnaissance - Part 3.mp4 75.83MB
7. Active Reconnaissance - Part 3.srt 13.69KB
7. Important Specific Vulnerabilities such as XSS in-depth.mp4 144.73MB
7. Important Specific Vulnerabilities such as XSS in-depth.srt 21.73KB
7. Post Exploitation using Metasploit - Part 3.mp4 79.27MB
7. Post Exploitation using Metasploit - Part 3.srt 13.92KB
8.1 Target DB.xlsx 10.37KB
8. Important Specific Vulnerabilities such as File Upload & Command Injection.mp4 123.67MB
8. Important Specific Vulnerabilities such as File Upload & Command Injection.srt 18.61KB
8. Privilege Escalation Techniques - Part 1.mp4 158.31MB
8. Privilege Escalation Techniques - Part 1.srt 22.73KB
8. Store Active Data in the Right Way.html 662B
9. Part 1 Web Server Hacking Intro & Enumeration Ideas.mp4 123.60MB
9. Part 1 Web Server Hacking Intro & Enumeration Ideas.srt 16.49KB
9. Privilege Escalation Techniques - Part 2.mp4 142.74MB
9. Privilege Escalation Techniques - Part 2.srt 22.31KB
FreeCoursesOnline.me Download Udacity, Masterclass, Lynda, PHLearn, etc Free.url 290B
Distribution statistics by country
Slovak Republic (SK) 1
China (CN) 1
Romania (RO) 1
Total 3
IP List List of IP addresses which were distributed this torrent