Обратите внимание, что наш сайт не размещает какие-либо файлы из списка. Вы не можете скачать
эти файлы или скачать torrent-файл.
|
001.VM-setup.mp4 |
16.54Мб |
01.Intro.mp4 |
5.88Мб |
01 - Introduction to Windows Persistence.mp4 |
7.27Мб |
01-Introduction to Windows Security.mp4 |
20.45Мб |
02.PE-format.mp4 |
16.61Мб |
02 - Intro Addendum.mp4 |
3.00Мб |
02 - Intro Addendum.mp4 |
22.59Мб |
03.PE-bear.mp4 |
18.32Мб |
03 - Course VM Setup.mp4 |
6.77Мб |
03-Course VM Setup.mp4 |
9.36Мб |
04.generateEXEvsDLL.mp4 |
12.78Мб |
04-Low Hanging Passwords.mp4 |
36.05Мб |
04 - Start Folder and Registry Keys.mp4 |
24.45Мб |
05.generatePE.mp4 |
40.49Мб |
05-Interesting Files.mp4 |
13.48Мб |
05 - Logon Scripts.mp4 |
14.59Мб |
06.payload-storage.mp4 |
11.24Мб |
06-Registry.mp4 |
13.43Мб |
06 - Shortcut Mods.mp4 |
22.40Мб |
07.payload-stor-text.mp4 |
46.67Мб |
07-Abusing Credential Manager.mp4 |
47.43Мб |
07 - Screensavers.mp4 |
13.49Мб |
08.payload-stor-data.mp4 |
24.07Мб |
08 - Powershell Profile.mp4 |
14.29Мб |
08-Robbing Credential Manager.mp4 |
13.07Мб |
09.payload-stor-rsrc.mp4 |
41.06Мб |
09-Asking User for Creds.mp4 |
14.04Мб |
09 - DLL Proxying - Introduction.mp4 |
6.27Мб |
10.payload-EE.mp4 |
11.23Мб |
10 - DLL Proxying - Demo.mp4 |
91.49Мб |
10-Unsecured Service [1].mp4 |
33.15Мб |
11.payload-encoding-B64.mp4 |
39.19Мб |
11 - Component Object Model - Introduction.mp4 |
13.86Мб |
11-Unsecured Service [2].mp4 |
37.42Мб |
12.payload-encrypt-XOR.mp4 |
32.39Мб |
12 - COMs Registry.mp4 |
18.39Мб |
12-Unsecured Service [3].mp4 |
35.75Мб |
13.payload-encrypt-AES.mp4 |
27.99Мб |
13 - COM Hijacks and Proxies.mp4 |
56.25Мб |
13-Unsecured File System.mp4 |
62.27Мб |
14.function-call-obfusc.mp4 |
8.84Мб |
14 - Elevated Scheduled Tasks.mp4 |
36.30Мб |
14-Exploiting PATH.mp4 |
25.84Мб |
15.function-call-obfusc-Example.mp4 |
40.23Мб |
15-Missing Service.mp4 |
20.12Мб |
15 - Multiaction Tasks.mp4 |
22.97Мб |
16.backdooring-PE.mp4 |
9.52Мб |
16-Missing Task.mp4 |
37.64Мб |
16 - Modified Services.mp4 |
39.65Мб |
17.backdooring-PE-Example.mp4 |
103.37Мб |
17-DLL Hijacking.mp4 |
84.58Мб |
17 - IFEO - Debugger - SilentProcessExit - Verifier.mp4 |
62.60Мб |
17-UACME.mp4 |
47.83Мб |
18.code_inject-payload.mp4 |
8.87Мб |
18a.code_inject-why.mp4 |
11.14Мб |
18-AlwaysInstallElevated Hack.mp4 |
27.02Мб |
18 - Application Shims.mp4 |
30.70Мб |
19.code_inject-payload-Example.mp4 |
34.99Мб |
19-New Service for SYSTEM.mp4 |
14.12Мб |
19 - Windows Management Instrumentation - Introduction.mp4 |
5.52Мб |
20.code_inject-DLL.mp4 |
12.47Мб |
20-Leaked HANDLE [1].mp4 |
5.37Мб |
20 - WMI Event Subscription.mp4 |
24.56Мб |
21.code_inject-DLL-Example.mp4 |
30.64Мб |
21 - AppCert DLLs.mp4 |
35.96Мб |
21-Leaked HANDLE [2].mp4 |
43.17Мб |
22.hiding-console.mp4 |
27.76Мб |
22 - AppInit DLLs.mp4 |
28.18Мб |
22-Leaked HANDLE [3].mp4 |
36.62Мб |
23.combination.mp4 |
2.53Мб |
23-Abusing Tokens [1].mp4 |
3.37Мб |
23 - Netsh Helper DLLs.mp4 |
23.29Мб |
24.combination-Example.mp4 |
100.49Мб |
24-Abusing Tokens [2].mp4 |
24.92Мб |
24 - Winlogon - SHELL-USERINIT.mp4 |
24.52Мб |
25.combination-WD-bypass.mp4 |
74.30Мб |
25-Exploiting Named Pipes [1].mp4 |
5.04Мб |
25 - Time Providers.mp4 |
37.19Мб |
26.Summary-Ending.mp4 |
7.23Мб |
26-Exploiting Named Pipes [2].mp4 |
28.50Мб |
26 - Port Monitors.mp4 |
33.81Мб |
27-Course Closing Information.mp4 |
3.62Мб |
27 - Local Security Authority - Introduction.mp4 |
8.43Мб |
28 - LSA-as-a-Persistence - SSPs.mp4 |
44.09Мб |
29 - LSA-as-a-Persistence - Password Filters.mp4 |
23.74Мб |
ass1.txt |
103б |
ass2.txt |
158б |
ass3.txt |
298б |
ass4.txt |
535б |
Assignment.txt |
700б |
Assignment1.txt |
325б |
Assignment2.txt |
295б |
Assignment3.txt |
113б |
Course closing information.txt |
569б |
RTO-LPE.zip |
1.25Мб |
RTO-maldev.zip |
1.94Мб |
RTO-pers.zip |
220.09Кб |
RTO-Win10.ova |
8.18Гб |
Setup troubleshooting.txt |
212б |