Torrent Info
Title [FreeCoursesOnline.Me] CBTNugget - Penetration Testing Tools
Category
Size 6.46GB

Files List
Please note that this page does not hosts or makes available any of the listed filenames. You cannot download any of those files from here.
1. Get Free Premium Accounts Daily On Our Discord Server!.txt 1.32KB
1. Pentesting Reconnaissance.mp4 25.50MB
10. Basic NMAP Commands.mp4 28.14MB
100. Linux SUID and SUDO privilege escalation.mp4 41.39MB
101. Linux Local Exploit Privilege Escalation.mp4 80.34MB
102. Physical Pentest Documents.mp4 38.32MB
103. Reconnaissance and Planning.mp4 29.20MB
104. Physical Pentest Tools.mp4 53.18MB
105. Getting Inside.mp4 33.54MB
106. Continuing From the Inside.mp4 31.16MB
107. Physical Pentest Report.mp4 28.05MB
108. Credential Attacks Pt.1.mp4 38.02MB
109Credential Attacks Pt.2.mp4 42.88MB
11. Ping Scans with NMAP.mp4 22.39MB
110. Creating Custom Wordlists.mp4 61.02MB
111. Performing a Brute Force Attack.mp4 50.49MB
112. Cracking Hashed Passwords.mp4 73.04MB
113. Executing a Pass the Hash Attack.mp4 27.85MB
114. Credential Harvesting and PrivEsc in the Cloud.mp4 55.67MB
115. Running PACU.mp4 55.83MB
116. Misconfigured Cloud Assets.mp4 39.84MB
117. Running CloudSploit.mp4 59.57MB
118. Resource Exhaustion, Malware Injection and API Attacks.mp4 29.37MB
119. Side Channel and Direct-To-Origin Attacks.mp4 32.23MB
12. Scanning TCP and UDP with NMAP.mp4 32.43MB
120. Additional Cloud Pentesting Tools.mp4 20.80MB
121. Mobile Device Attacks.mp4 20.24MB
122. Mobile Device Vulnerabilities.mp4 46.56MB
123. Mobile Security Tools.mp4 26.63MB
124. Internet of Things (IoT) Devices.mp4 39.67MB
125. Data Storage System Vulnerabilities.mp4 34.85MB
126. SCADA, IIoT and ICS Vulnerabilities.mp4 28.14MB
127. Virtual Environment Vulnerabilities.mp4 28.36MB
128. Establishing Persistence.mp4 23.16MB
129. Lateral Movement.mp4 41.89MB
13. Identifying Host Attributes with NMAP.mp4 38.23MB
130. Data Exfiltration.mp4 30.76MB
131. Covering Your Tracks.mp4 30.09MB
132. Linux Post Exploit Activities.mp4 63.92MB
133. Windows Post Exploit Activities.mp4 72.93MB
134. Analyze a Basic Script.mp4 81.58MB
135. Scripting Basics.mp4 123.19MB
136. Assigning Values to Variables.mp4 87.12MB
137. Operating on Variables with Operators.mp4 77.35MB
138. Branching Code with Conditionals.mp4 83.92MB
139. Reapeating Code with Loops.mp4 91.29MB
14. Using NMAP Scripts.mp4 33.76MB
140. Handling Errors in Code.mp4 88.65MB
141. Intro.mp4 16.59MB
142. Analyzing PING Scripts.mp4 58.03MB
143. Downloading Files with Scripts.mp4 23.36MB
144. Automation with Scripts.mp4 85.48MB
145. Updating IP Settings with a Script.mp4 37.45MB
146. NMAP Reports in HTML.mp4 49.23MB
15. Bypassing Firewalls with NMAP.mp4 34.11MB
16. Intro to Enumerating Services and Vulnerabilities.mp4 14.16MB
17. Enumerating with Port Scanners.mp4 96.16MB
18. Enumerating Web Servers.mp4 113.66MB
19. Enumerating SMB and Shares.mp4 61.81MB
2. OneHack.us Premium Cracked Accounts-Tutorials-Guides-Articles Community Based Forum.url 377B
2. Pentesting Reconnaissance Tools.mp4 41.13MB
20. Enumerating Vulnerabilities with Nessus.mp4 89.17MB
21. Automating Enumeration.mp4 52.22MB
22. Pentest Enumeration Review.mp4 18.60MB
23. Social Engineering Anatomy.mp4 57.09MB
24. Social Engineering Attacks.mp4 40.29MB
25. Social Engineering Tools.mp4 40.33MB
26. Social Engineering Toolkit.mp4 97.54MB
27. Using WifiPhisher.mp4 17.20MB
28. Pharming With ShellPhish.mp4 36.55MB
29. Social Engineering Review.mp4 20.75MB
3. Domain Information Tools.mp4 72.45MB
3. FTUApps.com Download Cracked Developers Applications For Free.url 239B
30. Exploits and Payloads.mp4 40.28MB
31. Moving Files With PwnDrop.mp4 69.60MB
32. Transferring Files with SMB and SCP.mp4 49.20MB
33. Working With Exploits.mp4 103.67MB
34. Working With Payloads.mp4 46.83MB
35. Exploits and Payloads Review.mp4 8.91MB
36. Intro to the Metasploit Framework.mp4 23.83MB
37. Metasploit Startup and Workspaces.mp4 40.37MB
38. Metasploit Modules.mp4 68.37MB
39. Metasploit Options and Payloads.mp4 83.32MB
4. FreeCoursesOnline.me Download Udacity, Masterclass, Lynda, PHLearn, etc Free.url 290B
4. IP and DNS Information Tools.mp4 51.77MB
40. Managing Metasploit Sessions.mp4 22.68MB
41. Using Meterpreter.mp4 68.46MB
42. Metasploit Framework Review.mp4 10.41MB
43. Network Based Attacks and Tools.mp4 53.29MB
44. How Attacks Against ARP Work.mp4 31.76MB
45. ARP Poisoning Attack.mp4 43.23MB
46. How DNS Cache Poisoning Works.mp4 23.34MB
47. DNS Cache Poisoning Attack.mp4 29.73MB
48. VLAN Hopping Attacks.mp4 22.17MB
49. Bypassing Network Access Control.mp4 20.50MB
5. Combination OSINT Tools.mp4 72.32MB
50. Network Based Attacks Review.mp4 33.18MB
51. Host Protocol Attacks and Tools Overview.mp4 25.22MB
52. Server Message Block (SMB) Protocol.mp4 25.12MB
53. Attacking the SMB Protocol.mp4 70.65MB
54. Simple Network Management Protocol (SNMP).mp4 34.49MB
55. Exploiting the SNMP Protocol.mp4 83.12MB
56. Denial of Service Attacks.mp4 32.50MB
57. Analyzing the LLMNR Protocol.mp4 25.72MB
58. Attacking the LLMNR Protocol.mp4 35.01MB
59. Host Protocol Attacks and Tools Review.mp4 18.62MB
6. Breach Data Tools.mp4 24.74MB
60. Wireless and Mobile Device Attacks and Tools.mp4 42.26MB
61. Sniffing Wireless Data.mp4 39.96MB
62. Wireless Analysis With Kismet.mp4 42.72MB
63. Wireless Deauthentication Attacks.mp4 24.48MB
64. Cracking WPA2 Preshared Keys.mp4 31.99MB
65. Wireless Evil Twin Attack.mp4 55.68MB
66. Automated Wifi Attack Tools.mp4 34.22MB
67. Section Review.mp4 21.54MB
68. OWASP Top 10 (1 thru 3).mp4 56.68MB
69. OWASP Top 10 (4 thru 6).mp4 36.73MB
7. Pentesting Reconnaissance Review.mp4 16.61MB
70. OWASP Top 10 (7 thru 10).mp4 44.91MB
71. Cross Site Scripting (XSS) and Cross Site Request Forgery (CSRF).mp4 29.39MB
72. SQL Injection Attacks.mp4 26.00MB
73. File Inclusion Vulnerabilities.mp4 38.74MB
74. Additional Web App Vulnerabilities and Attacks.mp4 30.27MB
75. Web Application Pentesting.mp4 20.74MB
76. OWASP ZAP.mp4 72.53MB
77. Attack Scans Using OWASP ZAP.mp4 42.23MB
78. Brute Force Attack Using OWASP ZAP.mp4 52.20MB
79. SQL Injection Using SQLmap.mp4 72.32MB
8. Intro to Pentesting Enumeration.mp4 44.64MB
80. Local and Remote File Inclusion Attacks.mp4 48.73MB
81. Cross Site Scripting (XSS) Attacks.mp4 30.66MB
82. Bind and Reverse Shells.mp4 36.34MB
83. The Power of Web Shells.mp4 56.78MB
84. Working With Bind and Reverse Shells.mp4 28.62MB
85. Shell One-Liners.mp4 24.12MB
86. Spawning Meterpreter Shells.mp4 57.35MB
87. Log Poisoning for a Shell.mp4 58.11MB
88. Windows Privilege Escalation Pt.1.mp4 36.01MB
89. Windows Privilege Escalation Pt.2.mp4 28.90MB
9. Pentest Enumeration Tools.mp4 52.15MB
90. Getting a Windows Shell.mp4 58.03MB
91. Windows Local Host Enumeration.mp4 49.66MB
92. Windows Unquoted Service Path Vulnerability.mp4 46.28MB
93. Windows Local Exploit Privilege Escalation.mp4 86.62MB
94. Introduction to Privilege Escalation.mp4 46.32MB
95. Linux Privilege Escalation Pt.1.mp4 29.92MB
96. Linux Privilege Escalation Pt.2.mp4 33.19MB
97. Linux Shell Escalation.mp4 30.62MB
98. Linux Local Host Enumeration.mp4 61.53MB
99. Linux Privilege Escalation Via Cron Jobs.mp4 45.47MB
Distribution statistics by country
United States (US) 4
Netherlands (NL) 2
United Kingdom (GB) 1
Israel (IL) 1
Guyana (GY) 1
Russia (RU) 1
Angola (AO) 1
China (CN) 1
Canada (CA) 1
Germany (DE) 1
Total 14
IP List List of IP addresses which were distributed this torrent