|
Обратите внимание, что наш сайт не размещает какие-либо файлы из списка. Вы не можете скачать
эти файлы или скачать torrent-файл.
|
| 001.VM-setup.mp4 |
16.54Мб |
| 01.Intro.mp4 |
5.88Мб |
| 01 - Introduction to Windows Persistence.mp4 |
7.27Мб |
| 01-Introduction to Windows Security.mp4 |
20.45Мб |
| 02.PE-format.mp4 |
16.61Мб |
| 02 - Intro Addendum.mp4 |
3.00Мб |
| 02 - Intro Addendum.mp4 |
22.59Мб |
| 03.PE-bear.mp4 |
18.32Мб |
| 03 - Course VM Setup.mp4 |
6.77Мб |
| 03-Course VM Setup.mp4 |
9.36Мб |
| 04.generateEXEvsDLL.mp4 |
12.78Мб |
| 04-Low Hanging Passwords.mp4 |
36.05Мб |
| 04 - Start Folder and Registry Keys.mp4 |
24.45Мб |
| 05.generatePE.mp4 |
40.49Мб |
| 05-Interesting Files.mp4 |
13.48Мб |
| 05 - Logon Scripts.mp4 |
14.59Мб |
| 06.payload-storage.mp4 |
11.24Мб |
| 06-Registry.mp4 |
13.43Мб |
| 06 - Shortcut Mods.mp4 |
22.40Мб |
| 07.payload-stor-text.mp4 |
46.67Мб |
| 07-Abusing Credential Manager.mp4 |
47.43Мб |
| 07 - Screensavers.mp4 |
13.49Мб |
| 08.payload-stor-data.mp4 |
24.07Мб |
| 08 - Powershell Profile.mp4 |
14.29Мб |
| 08-Robbing Credential Manager.mp4 |
13.07Мб |
| 09.payload-stor-rsrc.mp4 |
41.06Мб |
| 09-Asking User for Creds.mp4 |
14.04Мб |
| 09 - DLL Proxying - Introduction.mp4 |
6.27Мб |
| 10.payload-EE.mp4 |
11.23Мб |
| 10 - DLL Proxying - Demo.mp4 |
91.49Мб |
| 10-Unsecured Service [1].mp4 |
33.15Мб |
| 11.payload-encoding-B64.mp4 |
39.19Мб |
| 11 - Component Object Model - Introduction.mp4 |
13.86Мб |
| 11-Unsecured Service [2].mp4 |
37.42Мб |
| 12.payload-encrypt-XOR.mp4 |
32.39Мб |
| 12 - COMs Registry.mp4 |
18.39Мб |
| 12-Unsecured Service [3].mp4 |
35.75Мб |
| 13.payload-encrypt-AES.mp4 |
27.99Мб |
| 13 - COM Hijacks and Proxies.mp4 |
56.25Мб |
| 13-Unsecured File System.mp4 |
62.27Мб |
| 14.function-call-obfusc.mp4 |
8.84Мб |
| 14 - Elevated Scheduled Tasks.mp4 |
36.30Мб |
| 14-Exploiting PATH.mp4 |
25.84Мб |
| 15.function-call-obfusc-Example.mp4 |
40.23Мб |
| 15-Missing Service.mp4 |
20.12Мб |
| 15 - Multiaction Tasks.mp4 |
22.97Мб |
| 16.backdooring-PE.mp4 |
9.52Мб |
| 16-Missing Task.mp4 |
37.64Мб |
| 16 - Modified Services.mp4 |
39.65Мб |
| 17.backdooring-PE-Example.mp4 |
103.37Мб |
| 17-DLL Hijacking.mp4 |
84.58Мб |
| 17 - IFEO - Debugger - SilentProcessExit - Verifier.mp4 |
62.60Мб |
| 17-UACME.mp4 |
47.83Мб |
| 18.code_inject-payload.mp4 |
8.87Мб |
| 18a.code_inject-why.mp4 |
11.14Мб |
| 18-AlwaysInstallElevated Hack.mp4 |
27.02Мб |
| 18 - Application Shims.mp4 |
30.70Мб |
| 19.code_inject-payload-Example.mp4 |
34.99Мб |
| 19-New Service for SYSTEM.mp4 |
14.12Мб |
| 19 - Windows Management Instrumentation - Introduction.mp4 |
5.52Мб |
| 20.code_inject-DLL.mp4 |
12.47Мб |
| 20-Leaked HANDLE [1].mp4 |
5.37Мб |
| 20 - WMI Event Subscription.mp4 |
24.56Мб |
| 21.code_inject-DLL-Example.mp4 |
30.64Мб |
| 21 - AppCert DLLs.mp4 |
35.96Мб |
| 21-Leaked HANDLE [2].mp4 |
43.17Мб |
| 22.hiding-console.mp4 |
27.76Мб |
| 22 - AppInit DLLs.mp4 |
28.18Мб |
| 22-Leaked HANDLE [3].mp4 |
36.62Мб |
| 23.combination.mp4 |
2.53Мб |
| 23-Abusing Tokens [1].mp4 |
3.37Мб |
| 23 - Netsh Helper DLLs.mp4 |
23.29Мб |
| 24.combination-Example.mp4 |
100.49Мб |
| 24-Abusing Tokens [2].mp4 |
24.92Мб |
| 24 - Winlogon - SHELL-USERINIT.mp4 |
24.52Мб |
| 25.combination-WD-bypass.mp4 |
74.30Мб |
| 25-Exploiting Named Pipes [1].mp4 |
5.04Мб |
| 25 - Time Providers.mp4 |
37.19Мб |
| 26.Summary-Ending.mp4 |
7.23Мб |
| 26-Exploiting Named Pipes [2].mp4 |
28.50Мб |
| 26 - Port Monitors.mp4 |
33.81Мб |
| 27-Course Closing Information.mp4 |
3.62Мб |
| 27 - Local Security Authority - Introduction.mp4 |
8.43Мб |
| 28 - LSA-as-a-Persistence - SSPs.mp4 |
44.09Мб |
| 29 - LSA-as-a-Persistence - Password Filters.mp4 |
23.74Мб |
| ass1.txt |
103б |
| ass2.txt |
158б |
| ass3.txt |
298б |
| ass4.txt |
535б |
| Assignment.txt |
700б |
| Assignment1.txt |
325б |
| Assignment2.txt |
295б |
| Assignment3.txt |
113б |
| Course closing information.txt |
569б |
| RTO-LPE.zip |
1.25Мб |
| RTO-maldev.zip |
1.94Мб |
| RTO-pers.zip |
220.09Кб |
| RTO-Win10.ova |
8.18Гб |
| Setup troubleshooting.txt |
212б |