Torrent Info
Title [FreeCourseSite.com] Udemy - Learn Hacking Windows 10 Using Metasploit From Scratch
Category PC
Size 1.72GB

Files List
Please note that this page does not hosts or makes available any of the listed filenames. You cannot download any of those files from here.
[CourseClub.NET].url 123B
[FCS Forum].url 133B
[FreeCourseSite.com].url 127B
001 Download-Kali-Linux-VM.txt 81B
001 Download-VirtualBox.txt 43B
001 Installing Kali Linux 2.0 as a Virtual Machine (VirtualBox).mp4 15.05MB
001 Installing Kali Linux 2.0 as a Virtual Machine (VirtualBox)-en.srt 6.71KB
002 Downlaod-VMware-Workstation-.txt 72B
002 Download-Kali-Linux-VM.txt 81B
002 Installing Kali Linux 2.0 as a Virtual Machine (VMware).mp4 6.81MB
002 Installing Kali Linux 2.0 as a Virtual Machine (VMware)-en.srt 3.91KB
003 Download-Kali-Linux-ISO.txt 33B
003 Download-VirtualBox.txt 43B
003 Installing Kali Linux 2.0 as ISO image.mp4 13.54MB
003 Installing Kali Linux 2.0 as ISO image-en.srt 7.83KB
004 Download-Windows.txt 65B
004 Setup Windows 10 as a Virtual Machine.mp4 6.02MB
004 Setup Windows 10 as a Virtual Machine-en.srt 3.37KB
005 Download-Metasploitable.txt 72B
005 Setup Metasploitable as a Virtual Machine.mp4 9.15MB
005 Setup Metasploitable as a Virtual Machine-en.srt 3.79KB
006 Configure the Network Settings.mp4 21.13MB
006 Configure the Network Settings-en.srt 6.67KB
007 ALFA-AWUS036NH.txt 166B
007 Connecting Wi-Fi card to the Virtual Machine.mp4 6.00MB
007 Connecting Wi-Fi card to the Virtual Machine-en.srt 2.25KB
007 TP-Link-N150.txt 146B
008 Updating Kali Linux.mp4 6.78MB
008 Updating Kali Linux-en.srt 2.05KB
009 Introduction.mp4 5.14MB
009 Introduction-en.srt 3.11KB
010 Discovering the connected clients.mp4 12.40MB
010 Discovering the connected clients-en.srt 22.19KB
011 Scanning the target OS (Part 1).mp4 36.38MB
011 Scanning the target OS (Part 1)-en.srt 21.74KB
012 Scanning the target OS (Part 2).mp4 23.13MB
012 Scanning the target OS (Part 2)-en.srt 13.26KB
013 Scanning the target OS using GUI.mp4 15.27MB
013 Scanning the target OS using GUI-en.srt 10.71KB
014 Gaining Access introduction.mp4 3.87MB
014 Gaining Access introduction-en.srt 2.36KB
015 Metasploit Fundamentals.mp4 63.34MB
015 Metasploit Fundamentals-en.srt 18.27KB
016 Creating a Payload using Msfvenom.mp4 22.61MB
016 Creating a Payload using Msfvenom-en.srt 10.08KB
017 Creating an Encoded Payload using Msfvenom.mp4 23.60MB
017 Creating an Encoded Payload using Msfvenom-en.srt 8.26KB
018 Testing the Payload in the target OS.mp4 26.06MB
018 Testing the Payload in the target OS-en.srt 11.45KB
019 Introduction.mp4 2.84MB
019 Introduction-en.srt 1.91KB
020 Installing Veil Framework.mp4 19.25MB
020 Installing Veil Framework-en.srt 5.24KB
021 Creating an undetectable Payload.mp4 29.21MB
021 Creating an undetectable Payload-en.srt 11.41KB
022 Combine an EXE file with the Payload (1st method).mp4 33.87MB
022 Combine an EXE file with the Payload (1st method)-en.srt 13.64KB
022 List-of-payloads-types.txt 79B
023 Combine an EXE file with the Payload (2nd method).mp4 23.83MB
023 Combine an EXE file with the Payload (2nd method)-en.srt 8.31KB
023 Download-Shellter.txt 43B
024 autoit-download-and-execute.txt 84B
024 Combine the Payload with an ImagePDFMP3 etc.....mp4 50.73MB
024 Combine the Payload with an ImagePDFMP3 etc....-en.srt 16.63KB
024 Converting-Service.txt 48B
024 Download-Autoit.txt 53B
025 Combine the Payload with an Excel Word file.mp4 33.43MB
025 Combine the Payload with an Excel Word file-en.srt 14.60KB
025 MacroShop.txt 40B
026 Spoofing the Backdoor extension.mp4 28.25MB
026 Spoofing the Backdoor extension-en.srt 10.92KB
027 Introduction.mp4 3.46MB
027 Introduction-en.srt 1.94KB
028 Interact with the Target Computer (Part 1).mp4 28.87MB
028 Interact with the Target Computer (Part 1)-en.srt 9.98KB
029 Interact with the Target Computer (Part 2).mp4 27.31MB
029 Interact with the Target Computer (Part 2)-en.srt 9.89KB
030 Persist your connection in the target OS.mp4 30.01MB
030 Persist your connection in the target OS-en.srt 11.71KB
031 Escalate your privileges in Windows 10.mp4 28.43MB
031 Escalate your privileges in Windows 10-en.srt 7.66KB
032 Escalate your privileges in Windows 8.187.mp4 19.75MB
032 Escalate your privileges in Windows 8.187-en.srt 11.89KB
033 Migrating the Backdoor with the running processes.mp4 30.20MB
033 Migrating the Backdoor with the running processes-en.srt 11.42KB
034 Check the virtualization Clear log event.mp4 20.80MB
034 Check the virtualization Clear log event-en.srt 9.62KB
035 Uninstalling programs from the target OS.mp4 20.54MB
035 Uninstalling programs from the target OS-en.srt 8.10KB
036 AddRemove users and changing the Admin password.mp4 20.87MB
036 AddRemove users and changing the Admin password-en.srt 7.55KB
037 What is Pivoting.mp4 44.70MB
037 What is Pivoting-en.srt 49.65KB
038 Pivot from the Victim System to Own Every Device on the Network (1st Case).mp4 32.97MB
038 Pivot from the Victim System to Own Every Device on the Network (1st Case)-en.srt 46.02KB
039 Pivot from the Victim System to Own Every Device on the Network (2nd Case).mp4 37.42MB
039 Pivot from the Victim System to Own Every Device on the Network (2nd Case)-en.srt 19.51KB
040 Stealing the target Wi-Fi password.mp4 30.28MB
040 Stealing the target Wi-Fi password-en.srt 12.24KB
041 Capture the keystrokes of the target keyboard.mp4 24.48MB
041 Capture the keystrokes of the target keyboard-en.srt 33.97KB
042 Stealing Windows credentials.mp4 25.78MB
042 Stealing Windows credentials-en.srt 11.23KB
043 Cracking the administrator password.mp4 30.29MB
043 Cracking the administrator password-en.srt 41.01KB
044 Download-Lazagne.txt 49B
044 Stealing the stored passwords Visited websites.mp4 30.89MB
044 Stealing the stored passwords Visited websites-en.srt 14.41KB
045 Recover the deleted files from the target OS.mp4 26.58MB
045 Recover the deleted files from the target OS-en.srt 13.27KB
046 Enumerate USB Drive history.mp4 5.76MB
046 Enumerate USB Drive history-en.srt 4.23KB
047 Redirect the target from to any website.mp4 53.77MB
047 Redirect the target from to any website-en.srt 20.98KB
048 Introduction.mp4 3.47MB
048 Introduction-en.srt 5.57KB
049 Hooking the target browser with BeEF.mp4 35.39MB
049 Hooking the target browser with BeEF-en.srt 55.37KB
050 Online-video-converter.txt 39B
050 Play any sound in the target browser.mp4 28.03MB
050 Play any sound in the target browser-en.srt 38.69KB
051 Capture a screenshot from the target browser.mp4 9.76MB
051 Capture a screenshot from the target browser-en.srt 14.15KB
052 Redirect the target to any website.mp4 17.03MB
052 Redirect the target to any website-en.srt 25.78KB
053 Run any YouTube video in the target browser.mp4 14.49MB
053 Run any YouTube video in the target browser-en.srt 20.17KB
054 Stealing the target online accounts with BeEF.mp4 16.56MB
054 Stealing the target online accounts with BeEF-en.srt 30.29KB
055 Integrate Metasploit framework with BeEF Project.mp4 27.40MB
055 Integrate Metasploit framework with BeEF Project-en.srt 36.81KB
056 Hacking the target Windows OS through the hooked browser.mp4 26.60MB
056 Hacking the target Windows OS through the hooked browser-en.srt 40.59KB
057 Having some fun with BeEF.mp4 33.44MB
057 Having some fun with BeEF-en.srt 37.66KB
058 Introduction.mp4 4.55MB
058 Introduction-en.srt 8.71KB
059 Configuring the router and port forwarding (1st method).mp4 27.48MB
059 Configuring the router and port forwarding (1st method)-en.srt 52.97KB
060 Configure the Backdoor.mp4 16.79MB
060 Configure the Backdoor-en.srt 25.89KB
061 Port forwarding using VPS SSH tunnel (2nd method).mp4 47.01MB
061 Port forwarding using VPS SSH tunnel (2nd method)-en.srt 68.17KB
062 Configure BeEF over WAN network.mp4 20.28MB
062 Configure BeEF over WAN network-en.srt 28.28KB
063 Detect Kill any Meterpreter session.mp4 26.88MB
063 Detect Kill any Meterpreter session-en.srt 29.70KB
063 Download-Metasploit-session-detector.txt 63B
064 Detect the running backdoor manually.mp4 33.28MB
064 Detect the running backdoor manually-en.srt 44.72KB
065 Detecting the combined backdoor with an imagepdf etc....mp4 3.88MB
065 Detecting the combined backdoor with an imagepdf etc...-en.srt 19.19KB
066 Detecting the combined backdoor (MD5 hash).mp4 11.45MB
066 Detecting the combined backdoor (MD5 hash)-en.srt 8.83KB
066 Download-WinMd5.txt 24B
067 Download-Zemana-Antilogger.txt 41B
067 Encrypting your keyboard keystrokes.mp4 18.33MB
067 Encrypting your keyboard keystrokes-en.srt 24.74KB
068 Analyzing the network connections.mp4 29.86MB
068 Analyzing the network connections-en.srt 27.53KB
068 Download-CurrPorts.txt 42B
069 Analyze the running processes.mp4 15.68MB
069 Analyze the running processes-en.srt 21.17KB
069 Download-Hijackthis.txt 38B
069 Hijackthis-website.txt 27B
070 Detecting the backdoor using a Sandbox.mp4 13.11MB
070 Detecting the backdoor using a Sandbox-en.srt 21.89KB
070 Hybrid-analysis.txt 33B
071 Demonstration.mp4 11.95MB
071 Demonstration-en.srt 2.99KB
071 Demonstration-es.srt 3.04KB
072 The Theory.mp4 5.11MB
072 The Theory-en.srt 2.09KB
072 The Theory-es.srt 2.07KB
073 Arduino-Leonardo.txt 158B
073 BadUSB.txt 153B
073 The needed hardware and software.mp4 31.90MB
073 The needed hardware and software-en.srt 9.97KB
073 The needed hardware and software-es.srt 9.85KB
073 USB-RUBBER-DUCKY.txt 54B
074 Download-Arduino-IDE.txt 74B
074 Installing needed software.mp4 10.23MB
074 Installing needed software-en.srt 5.09KB
074 Installing needed software-es.srt 4.99KB
075 Converting the commands to Arduino script (CC).mp4 26.72MB
075 Converting the commands to Arduino script (CC)-en.srt 14.48KB
075 Converting the commands to Arduino script (CC)-es.srt 14.52KB
075 Dckuino-script.txt 29B
075 Hello-World-commands.txt 31B
075 USB-Rubber-Ducky-commands.txt 65B
076 Change the administrator password and force him to sign out.mp4 45.78MB
076 Change the administrator password and force him to sign out-en.srt 21.06KB
076 Change the administrator password and force him to sign out-es.srt 21.18KB
076 Dckuino-script.txt 29B
076 the-used-commands.txt 31B
077 Fully control any Windows OS within 2 seconds.mp4 40.92MB
077 Fully control any Windows OS within 2 seconds-en.srt 18.82KB
077 Fully control any Windows OS within 2 seconds-es.srt 18.83KB
077 the-used-commands.txt 31B
078 Conclusion.html 3.28KB
079 Bonus Lecture - Discounts On all My Ethical Hacking Courses.html 4.43KB
Distribution statistics by country
Total 0
IP List List of IP addresses which were distributed this torrent