|
Please note that this page does not hosts or makes available any of the listed filenames. You
cannot download any of those files from here.
|
| [GigaCourse.com].url |
49B |
| 1.1 cherrytree.html |
96B |
| 1.1 Course Discord.html |
87B |
| 1.1 Course FAQ - External Option.html |
124B |
| 1.1 KeepNote.html |
81B |
| 1.1 Oracle VirtualBox.html |
102B |
| 1.1 Practical Ethical Hacking - FAQ.pdf |
163.38KB |
| 1.1 The Cyber Mentor.html |
87B |
| 1.1 Top Five Ways I Got Domain Admin.html |
190B |
| 1.1 VMWare Workstation Player.html |
146B |
| 1.2 Course Discord.html |
87B |
| 1.2 Course FAQ - External Option.html |
124B |
| 1.2 Joplin.html |
96B |
| 1.2 OneNote.html |
132B |
| 1.2 Oracle VirtualBox.html |
102B |
| 1.2 Practical Ethical Hacking - FAQ.pdf |
163.38KB |
| 1.2 The Cyber Mentor.html |
87B |
| 1.2 VMWare Workstation Player.html |
146B |
| 1.3 cherrytree.html |
96B |
| 1.3 Joplin.html |
96B |
| 1.4 KeepNote.html |
81B |
| 1.4 OneNote.html |
132B |
| 1. Active Directory Overview.mp4 |
22.56MB |
| 1. Active Directory Overview.srt |
7.66KB |
| 1. BONUS LECTURE Course Discord Channel and Other Author Resources.mp4 |
42.55MB |
| 1. BONUS LECTURE Course Discord Channel and Other Author Resources.srt |
6.88KB |
| 1. Career Advice.mp4 |
36.50MB |
| 1. Career Advice.srt |
17.01KB |
| 1. Common Legal Documents.mp4 |
25.43MB |
| 1. Common Legal Documents.srt |
11.28KB |
| 1. Course Resources.html |
537B |
| 1. Exploring Kali Linux.mp4 |
70.26MB |
| 1. Exploring Kali Linux.srt |
70.27MB |
| 1. Installing Kioptrix Level 1.mp4 |
44.84MB |
| 1. Installing Kioptrix Level 1.srt |
10.04KB |
| 1. Installing VMWare Virtualbox.mp4 |
54.83MB |
| 1. Installing VMWare Virtualbox.srt |
9.11KB |
| 1. Introduction.mp4 |
75.90MB |
| 1. Introduction.mp4 |
25.66MB |
| 1. Introduction.mp4 |
3.52MB |
| 1. Introduction.mp4 |
1.95MB |
| 1. Introduction.mp4 |
2.76MB |
| 1. Introduction.mp4 |
3.56MB |
| 1. Introduction.mp4 |
3.94MB |
| 1. Introduction.mp4 |
3.46MB |
| 1. Introduction.mp4 |
7.72MB |
| 1. Introduction.srt |
12.50KB |
| 1. Introduction.srt |
5.81KB |
| 1. Introduction.srt |
2.94KB |
| 1. Introduction.srt |
1.54KB |
| 1. Introduction.srt |
2.74KB |
| 1. Introduction.srt |
2.67KB |
| 1. Introduction.srt |
2.08KB |
| 1. Introduction.srt |
1.71KB |
| 1. Introduction.srt |
3.39KB |
| 1. Introduction and Course Overview.mp4 |
10.26MB |
| 1. Introduction and Course Overview.srt |
5.96KB |
| 1. Lab Overview and Requirements.mp4 |
7.65MB |
| 1. Lab Overview and Requirements.srt |
4.65KB |
| 1. Part 1 Effective Note Keeping.mp4 |
49.30MB |
| 1. Part 1 Effective Note Keeping.srt |
10.70KB |
| 1. Passive Reconnaissance Overview.mp4 |
21.33MB |
| 1. Passive Reconnaissance Overview.srt |
11.44KB |
| 1. Required Installations.mp4 |
58.44MB |
| 1. Required Installations.srt |
8.68KB |
| 1. Reverse Shells vs Bind Shells.mp4 |
37.04MB |
| 1. Reverse Shells vs Bind Shells.srt |
10.20KB |
| 1. Scanning with Masscan.mp4 |
26.46MB |
| 1. Scanning with Masscan.srt |
8.94KB |
| 1. The Five Stages of Ethical Hacking.mp4 |
13.61MB |
| 1. The Five Stages of Ethical Hacking.srt |
7.59KB |
| 1. Wireless Penetration Testing Overview.mp4 |
48.37MB |
| 1. Wireless Penetration Testing Overview.srt |
16.60KB |
| 10.1 Top 10-2017 A2-Broken Authentication.html |
129B |
| 10. Broken Authentication Overview and Defenses.mp4 |
78.64MB |
| 10. Broken Authentication Overview and Defenses.srt |
8.28KB |
| 10. Google Fu.mp4 |
58.40MB |
| 10. Google Fu.srt |
7.63KB |
| 10. SMB Relay Attack Demonstration Part 2.mp4 |
29.56MB |
| 10. SMB Relay Attack Demonstration Part 2.srt |
5.46KB |
| 10. Token Impersonation with Incognito.mp4 |
48.13MB |
| 10. Token Impersonation with Incognito.srt |
9.41KB |
| 10. Tuples.mp4 |
31.80MB |
| 10. Tuples.srt |
3.41KB |
| 10. Walkthrough - Grandpa.mp4 |
163.28MB |
| 10. Walkthrough - Grandpa.srt |
21.03KB |
| 11. Looping.mp4 |
58.75MB |
| 11. Looping.srt |
6.65KB |
| 11. SMB Relay Attack Defenses.mp4 |
12.69MB |
| 11. SMB Relay Attack Defenses.srt |
3.65KB |
| 11. Testing for Broken Authentication.mp4 |
63.53MB |
| 11. Testing for Broken Authentication.srt |
10.92KB |
| 11. Token Impersonation Mitigation.mp4 |
15.20MB |
| 11. Token Impersonation Mitigation.srt |
3.90KB |
| 11. Utilizing Social Media.mp4 |
40.18MB |
| 11. Utilizing Social Media.srt |
8.15KB |
| 11. Walkthrough - Netmon.mp4 |
233.96MB |
| 11. Walkthrough - Netmon.srt |
35.10KB |
| 12.1 Top 10-2017 A3-Sensitive Data Exposure.html |
131B |
| 12. Gaining Shell Access.mp4 |
61.26MB |
| 12. Gaining Shell Access.srt |
9.99KB |
| 12. Importing Modules.mp4 |
50.86MB |
| 12. Importing Modules.srt |
8.12KB |
| 12. Kerberoasting Overview.mp4 |
25.77MB |
| 12. Kerberoasting Overview.srt |
7.55KB |
| 12. Sensitive Data Exposure Overview and Defenses.mp4 |
66.65MB |
| 12. Sensitive Data Exposure Overview and Defenses.srt |
6.75KB |
| 13. Advanced Strings.mp4 |
145.43MB |
| 13. Advanced Strings.srt |
17.43KB |
| 13. IPv6 Attacks Overview.mp4 |
9.17MB |
| 13. IPv6 Attacks Overview.srt |
5.57KB |
| 13. Kerberoasting Walkthrough.mp4 |
43.33MB |
| 13. Kerberoasting Walkthrough.srt |
5.11KB |
| 13. Testing for Sensitive Data Exposure.mp4 |
79.91MB |
| 13. Testing for Sensitive Data Exposure.srt |
11.16KB |
| 14.1 Top 10-2017 A4-XML External Entities (XXE).html |
135B |
| 14. Dictionaries.mp4 |
114.61MB |
| 14. Dictionaries.srt |
9.14KB |
| 14. Installing mitm6.mp4 |
13.49MB |
| 14. Installing mitm6.srt |
1.58KB |
| 14. Kerberoasting Mitigation.mp4 |
7.43MB |
| 14. Kerberoasting Mitigation.srt |
1.63KB |
| 14. XML External Entities (XXE) Overview.mp4 |
28.18MB |
| 14. XML External Entities (XXE) Overview.srt |
13.14KB |
| 15.1 Pentesting in the Real World Group Policy Pwnage.html |
145B |
| 15. GPP cPassword Attacks Overview.mp4 |
21.85MB |
| 15. GPP cPassword Attacks Overview.srt |
4.45KB |
| 15. Setting Up LDAPS.mp4 |
12.92MB |
| 15. Setting Up LDAPS.srt |
2.78KB |
| 15. Sockets.mp4 |
47.38MB |
| 15. Sockets.srt |
7.84KB |
| 15. XXE Attack and Defense.mp4 |
77.44MB |
| 15. XXE Attack and Defense.srt |
11.41KB |
| 16.1 mitm6 – compromising IPv4 networks via IPv6.html |
138B |
| 16.1 The worst of both worlds Combining NTLM Relaying and Kerberos delegation.html |
140B |
| 16.1 Top 10-2017 A5-Broken Access Control.html |
129B |
| 16.2 mitm6 – compromising IPv4 networks via IPv6.html |
138B |
| 16.2 The worst of both worlds Combining NTLM Relaying and Kerberos delegation.html |
140B |
| 16. Abusing GPP Part 1.mp4 |
63.19MB |
| 16. Abusing GPP Part 1.srt |
12.08KB |
| 16. Broken Access Control Overview.mp4 |
48.53MB |
| 16. Broken Access Control Overview.srt |
4.71KB |
| 16. Building a Port Scanner.mp4 |
247.60MB |
| 16. Building a Port Scanner.srt |
27.78KB |
| 16. IPv6 DNS Takeover via mitm6.mp4 |
86.78MB |
| 16. IPv6 DNS Takeover via mitm6.srt |
11.09KB |
| 17. Abusing GPP Part 2.mp4 |
41.62MB |
| 17. Abusing GPP Part 2.srt |
5.70KB |
| 17. Broken Access Control Walkthrough.mp4 |
35.49MB |
| 17. Broken Access Control Walkthrough.srt |
6.22KB |
| 17. IPv6 Attack Defenses.mp4 |
19.91MB |
| 17. IPv6 Attack Defenses.srt |
4.54KB |
| 18.1 Mimikatz Github.html |
99B |
| 18.1 Top 10-2017 A6-Security Misconfiguration.html |
133B |
| 18. Mimikatz Overview.mp4 |
33.12MB |
| 18. Mimikatz Overview.srt |
8.43KB |
| 18. Other Attack Vectors and Strategies.mp4 |
26.96MB |
| 18. Other Attack Vectors and Strategies.srt |
13.25KB |
| 18. Security Misconfiguration Attacks and Defenses.mp4 |
68.17MB |
| 18. Security Misconfiguration Attacks and Defenses.srt |
7.72KB |
| 19.1 DOM BASED CROSS SITE SCRIPTING.html |
98B |
| 19.1 XSS Game.html |
90B |
| 19.2 DOM BASED CROSS SITE SCRIPTING.html |
98B |
| 19.2 Top 10-2017 A7-Cross-Site Scripting (XSS).html |
134B |
| 19.3 Top 10-2017 A7-Cross-Site Scripting (XSS).html |
134B |
| 19.3 XSS Game.html |
90B |
| 19. Credential Dumping with Mimikatz.mp4 |
72.35MB |
| 19. Credential Dumping with Mimikatz.srt |
13.13KB |
| 19. Cross-Site Scripting (XSS) Overview.mp4 |
81.88MB |
| 19. Cross-Site Scripting (XSS) Overview.srt |
15.16KB |
| 2.1 Course FAQ - External Option.html |
124B |
| 2.1 Demo Company - Security Assessment Findings Report.pdf |
319.08KB |
| 2.1 OWASP Testing Checklist.html |
114B |
| 2.1 OWASP Top 10.html |
129B |
| 2.1 Practical Ethical Hacking - FAQ.pdf |
163.38KB |
| 2.1 Sample Pentest Report Github.html |
129B |
| 2.1 Share Repository.html |
127B |
| 2.2 Course FAQ - External Option.html |
124B |
| 2.2 Demo Company - Security Assessment Findings Report.pdf |
319.08KB |
| 2.2 OWASP Testing Guide.html |
104B |
| 2.2 Practical Ethical Hacking - FAQ.pdf |
163.38KB |
| 2.2 Sample Pentest Report Github.html |
129B |
| 2.3 OWASP Testing Checklist.html |
114B |
| 2.3 OWASP Top 10.html |
129B |
| 2. Buffer Overflows Explained.mp4 |
30.15MB |
| 2. Buffer Overflows Explained.srt |
5.95KB |
| 2. Downloading Necessary ISOs.mp4 |
17.83MB |
| 2. Downloading Necessary ISOs.srt |
4.03KB |
| 2. File Transfers Review.mp4 |
8.04MB |
| 2. File Transfers Review.srt |
3.52KB |
| 2. Frequently Asked Questions Guide.mp4 |
7.98MB |
| 2. Frequently Asked Questions Guide.srt |
1.42KB |
| 2. Identifying Our Target.mp4 |
42.91MB |
| 2. Identifying Our Target.srt |
5.14KB |
| 2. Installing Go.mp4 |
48.94MB |
| 2. Installing Go.srt |
4.47KB |
| 2. IP Addresses.mp4 |
78.34MB |
| 2. IP Addresses.srt |
18.44KB |
| 2. Linux Image Repository (UPDATE).mp4 |
3.30MB |
| 2. Linux Image Repository (UPDATE).srt |
2.18KB |
| 2. LLMNR Poisoning Overview.mp4 |
45.68MB |
| 2. LLMNR Poisoning Overview.srt |
10.99KB |
| 2. Navigating the File System.mp4 |
113.39MB |
| 2. Navigating the File System.srt |
16.43KB |
| 2. Part 2 Important Tools.mp4 |
38.74MB |
| 2. Part 2 Important Tools.srt |
9.12KB |
| 2. Pass the Hash Password Overview.mp4 |
17.89MB |
| 2. Pass the Hash Password Overview.srt |
4.66KB |
| 2. Pentest Report Writing.mp4 |
62.60MB |
| 2. Pentest Report Writing.srt |
17.92KB |
| 2. Physical Active Directory Components.mp4 |
20.04MB |
| 2. Physical Active Directory Components.srt |
8.70KB |
| 2. PowerView Overview.mp4 |
20.05MB |
| 2. PowerView Overview.srt |
3.46KB |
| 2. Scanning with Metasploit.mp4 |
22.68MB |
| 2. Scanning with Metasploit.srt |
4.20KB |
| 2. Scanning with Nmap.mp4 |
133.24MB |
| 2. Scanning with Nmap.srt |
29.48KB |
| 2. Staged vs Non-Staged Payloads.mp4 |
12.64MB |
| 2. Staged vs Non-Staged Payloads.srt |
4.41KB |
| 2. Strings.mp4 |
55.02MB |
| 2. Strings.srt |
9.81KB |
| 2. The OWASP Top 10 and OWASP Testing Checklist.mp4 |
130.37MB |
| 2. The OWASP Top 10 and OWASP Testing Checklist.srt |
15.50KB |
| 2. Walkthrough - Legacy.mp4 |
331.87MB |
| 2. Walkthrough - Legacy.srt |
48.73KB |
| 2. WPA PSK Exploit Walkthrough.mp4 |
126.93MB |
| 2. WPA PSK Exploit Walkthrough.srt |
19.56KB |
| 20. Golden Ticket Attacks.mp4 |
52.35MB |
| 20. Golden Ticket Attacks.srt |
10.54KB |
| 20. Reflected XSS Walkthrough.mp4 |
73.60MB |
| 20. Reflected XSS Walkthrough.srt |
9.99KB |
| 21.1 Harmj0y Blog.html |
85B |
| 21.2 Pentester Academy Active Directory Labs.html |
112B |
| 21.3 eLearnSecurity PTX.html |
127B |
| 21.4 Pentester Academy Red Team Labs.html |
104B |
| 21.5 Active Directory Security Blog.html |
84B |
| 21. Conclusion and Additional Resources.mp4 |
69.98MB |
| 21. Conclusion and Additional Resources.srt |
8.66KB |
| 21. Stored XSS Walkthrough.mp4 |
49.06MB |
| 21. Stored XSS Walkthrough.srt |
9.16KB |
| 22. Preventing XSS.mp4 |
11.87MB |
| 22. Preventing XSS.srt |
5.17KB |
| 23.1 Top 10-2017 A8-Insecure Deserialization.html |
132B |
| 23. Insecure Deserialization.mp4 |
57.29MB |
| 23. Insecure Deserialization.srt |
6.00KB |
| 24.1 Top 10-2017 A9-Using Components with Known Vulnerabilities.html |
151B |
| 24. Using Components with Known Vulnerabilities.mp4 |
52.93MB |
| 24. Using Components with Known Vulnerabilities.srt |
6.87KB |
| 25.1 Top 10-2017 A10-Insufficient Logging & Monitoring.html |
176B |
| 25. Insufficient Logging and Monitoring.mp4 |
40.52MB |
| 25. Insufficient Logging and Monitoring.srt |
4.85KB |
| 3.1 Cracking Linux Hashes with Hashcat.html |
89B |
| 3.1 Installing Docker on Kali.html |
142B |
| 3.1 Kali Linux Download.html |
143B |
| 3.1 PowerView Cheat Sheet.html |
125B |
| 3.2 OWASP Juice Shop.html |
101B |
| 3. A Day in the Life of an Ethical Hacker.mp4 |
40.94MB |
| 3. A Day in the Life of an Ethical Hacker.srt |
25.92KB |
| 3. Capturing NTLMv2 Hashes with Responder.mp4 |
52.79MB |
| 3. Capturing NTLMv2 Hashes with Responder.srt |
7.39KB |
| 3. Domain Enumeration with PowerView.mp4 |
139.48MB |
| 3. Domain Enumeration with PowerView.srt |
22.81KB |
| 3. E-Mail Address Gathering with Hunter.io.mp4 |
20.35MB |
| 3. E-Mail Address Gathering with Hunter.io.srt |
7.40KB |
| 3. Enumerating HTTPHTTPS - Part 1.mp4 |
111.19MB |
| 3. Enumerating HTTPHTTPS - Part 1.srt |
20.99KB |
| 3. Finding Subdomains with Assetfinder.mp4 |
36.39MB |
| 3. Finding Subdomains with Assetfinder.srt |
9.70KB |
| 3. Gaining Root with Metasploit.mp4 |
54.15MB |
| 3. Gaining Root with Metasploit.srt |
11.47KB |
| 3. Installing crackmapexec.mp4 |
8.21MB |
| 3. Installing crackmapexec.srt |
1.09KB |
| 3. Installing Kali Linux.mp4 |
45.18MB |
| 3. Installing Kali Linux.srt |
7.85KB |
| 3. Installing OWASP Juice Shop.mp4 |
88.63MB |
| 3. Installing OWASP Juice Shop.srt |
10.21KB |
| 3. Logical Active Directory Components.mp4 |
22.86MB |
| 3. Logical Active Directory Components.srt |
10.65KB |
| 3. MAC Addresses.mp4 |
28.67MB |
| 3. MAC Addresses.srt |
4.66KB |
| 3. Maintaining Access Overview.mp4 |
7.81MB |
| 3. Maintaining Access Overview.srt |
5.32KB |
| 3. Math.mp4 |
43.27MB |
| 3. Math.srt |
7.49KB |
| 3. Reviewing a Real Pentest Report.mp4 |
79.26MB |
| 3. Reviewing a Real Pentest Report.srt |
19.52KB |
| 3. Scanning with Nessus - Part 1.mp4 |
98.95MB |
| 3. Scanning with Nessus - Part 1.srt |
16.26KB |
| 3. Setting Up the Domain Controller.mp4 |
76.25MB |
| 3. Setting Up the Domain Controller.srt |
17.26KB |
| 3. Spiking.mp4 |
60.29MB |
| 3. Spiking.srt |
14.68KB |
| 3. Users and Privileges.mp4 |
94.18MB |
| 3. Users and Privileges.srt |
13.18KB |
| 3. Walkthrough - Lame.mp4 |
279.98MB |
| 4. Bloodhound Overview and Setup.mp4 |
35.91MB |
| 4. Bloodhound Overview and Setup.srt |
5.05KB |
| 4. Common Network Commands.mp4 |
63.74MB |
| 4. Common Network Commands.srt |
7.45KB |
| 4. Enumerating HTTPHTTPS - Part 2.mp4 |
150.59MB |
| 4. Enumerating HTTPHTTPS - Part 2.srt |
21.53KB |
| 4. Finding Subdomains with Amass.mp4 |
56.97MB |
| 4. Finding Subdomains with Amass.srt |
7.44KB |
| 4. Fuzzing.mp4 |
29.53MB |
| 4. Fuzzing.srt |
9.58KB |
| 4. Gathering Breached Credentials with Breach-Parse.mp4 |
69.79MB |
| 4. Gathering Breached Credentials with Breach-Parse.srt |
10.22KB |
| 4. Installing Foxy Proxy.mp4 |
27.14MB |
| 4. Installing Foxy Proxy.srt |
3.01KB |
| 4. Manual Exploitation.mp4 |
136.32MB |
| 4. Manual Exploitation.srt |
17.09KB |
| 4. Pass the Password Attacks.mp4 |
67.28MB |
| 4. Pass the Password Attacks.srt |
9.49KB |
| 4. Password Cracking with Hashcat.mp4 |
154.35MB |
| 4. Password Cracking with Hashcat.srt |
16.29KB |
| 4. Pivoting Lab Setup.mp4 |
59.09MB |
| 4. Pivoting Lab Setup.srt |
8.14KB |
| 4. Scanning with Nessus - Part 2.mp4 |
50.58MB |
| 4. Scanning with Nessus - Part 2.srt |
9.41KB |
| 4. Setting Up the User Machines.mp4 |
35.70MB |
| 4. Setting Up the User Machines.srt |
10.96KB |
| 4. TCP, UDP, and the Three-Way Handshake.mp4 |
21.72MB |
| 4. TCP, UDP, and the Three-Way Handshake.srt |
7.94KB |
| 4. Variables & Methods.mp4 |
110.61MB |
| 4. Variables & Methods.srt |
13.86KB |
| 4. Walkthrough - Blue.mp4 |
284.21MB |
| 4. Walkthrough - Blue.srt |
42.60KB |
| 5. Brute Force Attacks.mp4 |
93.16MB |
| 5. Brute Force Attacks.srt |
9.46KB |
| 5. Common Ports and Protocols.mp4 |
16.73MB |
| 5. Common Ports and Protocols.srt |
8.62KB |
| 5. Dumping Hashes with secretsdump.py.mp4 |
24.03MB |
| 5. Dumping Hashes with secretsdump.py.srt |
4.82KB |
| 5. Enumerating SMB.mp4 |
90.28MB |
| 5. Enumerating SMB.srt |
21.61KB |
| 5. Exploring Burp Suite.mp4 |
106.03MB |
| 5. Exploring Burp Suite.srt |
16.26KB |
| 5. Finding Alive Domains with Httprobe.mp4 |
75.67MB |
| 5. Finding Alive Domains with Httprobe.srt |
9.71KB |
| 5. Finding the Offset.mp4 |
42.16MB |
| 5. Finding the Offset.srt |
7.55KB |
| 5. Functions.mp4 |
97.18MB |
| 5. Functions.srt |
13.75KB |
| 5. Grabbing Data with Invoke-Bloodhound.mp4 |
31.58MB |
| 5. Grabbing Data with Invoke-Bloodhound.srt |
4.35KB |
| 5. LLMNR Poisoning Defenses.mp4 |
18.29MB |
| 5. LLMNR Poisoning Defenses.srt |
3.92KB |
| 5. Pivoting Walkthrough.mp4 |
52.12MB |
| 5. Pivoting Walkthrough.srt |
8.39KB |
| 5. Setting Up Users, Groups, and Policies.mp4 |
99.71MB |
| 5. Setting Up Users, Groups, and Policies.srt |
20.11KB |
| 5. Utilizing theharvester.mp4 |
50.97MB |
| 5. Utilizing theharvester.srt |
5.35KB |
| 5. Viewing, Creating, and Editing Files.mp4 |
39.88MB |
| 5. Viewing, Creating, and Editing Files.srt |
39.88MB |
| 5. Walkthrough - Devel.mp4 |
246.72MB |
| 5. Walkthrough - Devel.srt |
39.36KB |
| 6. Boolean Expressions.mp4 |
37.40MB |
| 6. Boolean Expressions.srt |
5.64KB |
| 6. Cleaning Up.mp4 |
5.59MB |
| 6. Cleaning Up.srt |
4.09KB |
| 6. Cracking NTLM Hashes with Hashcat.mp4 |
27.39MB |
| 6. Cracking NTLM Hashes with Hashcat.srt |
4.66KB |
| 6. Enumerating Domain Data with Bloodhound.mp4 |
34.57MB |
| 6. Enumerating Domain Data with Bloodhound.srt |
11.53KB |
| 6. Enumerating SSH.mp4 |
31.12MB |
| 6. Enumerating SSH.srt |
5.50KB |
| 6. Hunting Subdomains - Part 1.mp4 |
79.51MB |
| 6. Hunting Subdomains - Part 1.srt |
7.12KB |
| 6. Introducing the Score Board.mp4 |
30.66MB |
| 6. Introducing the Score Board.srt |
4.30KB |
| 6. Joining Our Machines to the Domain.mp4 |
79.34MB |
| 6. Joining Our Machines to the Domain.srt |
11.60KB |
| 6. Overwriting the EIP.mp4 |
16.72MB |
| 6. Overwriting the EIP.srt |
4.50KB |
| 6. Password Spraying and Credential Stuffing.mp4 |
156.74MB |
| 6. Password Spraying and Credential Stuffing.srt |
20.21KB |
| 6. Screenshotting Websites with GoWitness.mp4 |
33.70MB |
| 6. Screenshotting Websites with GoWitness.srt |
4.80KB |
| 6. SMB Relay Attacks Overview.mp4 |
26.86MB |
| 6. SMB Relay Attacks Overview.srt |
7.93KB |
| 6. Starting and Stopping Kali Services.mp4 |
82.16MB |
| 6. Starting and Stopping Kali Services.srt |
10.62KB |
| 6. The OSI Model.mp4 |
12.55MB |
| 6. The OSI Model.srt |
7.66KB |
| 6. Walkthrough - Jerry.mp4 |
305.37MB |
| 6. Walkthrough - Jerry.srt |
46.69KB |
| 7.1 Seven Second Subnetting.html |
104B |
| 7.1 Subnet-Guide.xlsx |
15.13KB |
| 7.1 sumrecon - Github.html |
102B |
| 7.1 Top 10-2017 A1-Injection.html |
117B |
| 7.2 Seven Second Subnetting.html |
104B |
| 7.2 Subnet-Guide.xlsx |
15.13KB |
| 7.2 TCM's Modified Script.html |
90B |
| 7. Automating the Enumeration Process.mp4 |
59.54MB |
| 7. Automating the Enumeration Process.srt |
8.21KB |
| 7. Finding Bad Characters.mp4 |
44.80MB |
| 7. Finding Bad Characters.srt |
8.78KB |
| 7. Hunting Subdomains - Part 2.mp4 |
65.93MB |
| 7. Hunting Subdomains - Part 2.srt |
6.31KB |
| 7. Installing and Updating Tools.mp4 |
75.53MB |
| 7. Installing and Updating Tools.srt |
10.13KB |
| 7. Our Notes, Revisited.mp4 |
17.31MB |
| 7. Our Notes, Revisited.srt |
5.05KB |
| 7. Pass the Hash Attacks.mp4 |
53.61MB |
| 7. Pass the Hash Attacks.srt |
7.70KB |
| 7. Quick Lab Update.mp4 |
9.26MB |
| 7. Quick Lab Update.srt |
1.44KB |
| 7. Relational and Boolean Operators.mp4 |
74.88MB |
| 7. Relational and Boolean Operators.srt |
7.98KB |
| 7. Researching Potential Vulnerabilities.mp4 |
138.56MB |
| 7. Researching Potential Vulnerabilities.srt |
21.35KB |
| 7. SQL Injection Attacks Overview.mp4 |
19.24MB |
| 7. SQL Injection Attacks Overview.srt |
7.01KB |
| 7. Subnetting Part 1 - Methodology.mp4 |
207.87MB |
| 7. Subnetting Part 1 - Methodology.srt |
39.42KB |
| 7. Walkthrough - Nibbles.mp4 |
285.38MB |
| 7. Walkthrough - Nibbles.srt |
43.33KB |
| 8.1 ipsweep.sh |
213B |
| 8. Conditional Statements.mp4 |
122.47MB |
| 8. Conditional Statements.srt |
11.17KB |
| 8. Discovering Hosts with SMB Signing Disabled.mp4 |
42.19MB |
| 8. Discovering Hosts with SMB Signing Disabled.srt |
4.95KB |
| 8. Finding the Right Module.mp4 |
65.89MB |
| 8. Finding the Right Module.srt |
11.33KB |
| 8. Identifying Website Technologies.mp4 |
96.39MB |
| 8. Identifying Website Technologies.srt |
10.27KB |
| 8. Our Notes, so Far.mp4 |
16.13MB |
| 8. Our Notes, so Far.srt |
4.81KB |
| 8. Pass Attack Mitigations.mp4 |
14.42MB |
| 8. Pass Attack Mitigations.srt |
4.14KB |
| 8. Scripting with Bash.mp4 |
133.33MB |
| 8. Scripting with Bash.srt |
29.79KB |
| 8. SQL Injection Walkthrough.mp4 |
85.21MB |
| 8. SQL Injection Walkthrough.srt |
14.46KB |
| 8. Subnetting Part 2 - Hands-On Challenge.mp4 |
36.19MB |
| 8. Subnetting Part 2 - Hands-On Challenge.srt |
5.31KB |
| 8. Walkthrough - Optimum.mp4 |
235.57MB |
| 8. Walkthrough - Optimum.srt |
35.91KB |
| 9. Generating Shellcode and Getting Root.mp4 |
35.12MB |
| 9. Generating Shellcode and Getting Root.srt |
9.23KB |
| 9. Information Gathering with Burp Suite.mp4 |
105.72MB |
| 9. Information Gathering with Burp Suite.srt |
13.67KB |
| 9. Lists.mp4 |
143.16MB |
| 9. Lists.srt |
14.25KB |
| 9. SMB Relay Attack Demonstration Part 1.mp4 |
52.10MB |
| 9. SMB Relay Attack Demonstration Part 1.srt |
7.20KB |
| 9. SQL Injection Defenses.mp4 |
9.28MB |
| 9. SQL Injection Defenses.srt |
3.71KB |
| 9. Token Impersonation Overview.mp4 |
16.22MB |
| 9. Token Impersonation Overview.srt |
5.34KB |
| 9. Walkthrough - Bashed.mp4 |
242.28MB |
| 9. Walkthrough - Bashed.srt |
41.40KB |
| Readme.txt |
962B |