589689.xyz

[TCM Security Academy] Practical Ethical Hacking

  • 收录时间:2023-04-28 23:51:35
  • 文件大小:31GB
  • 下载次数:1
  • 最近下载:2023-04-28 23:51:35
  • 磁力链接:

文件列表

  1. NA-77- Walkthrough - Blue(2956).mp4 761MB
  2. NA-75- Walkthrough - Legacy(3419).mp4 726MB
  3. NA-13- Subnetting Part 1(2659).mp4 679MB
  4. NA-79- Walkthrough - Jerry(3402).mp4 665MB
  5. NA-76- Walkthrough - Lame(2947).mp4 627MB
  6. NA-80- Walkthrough - Nibbles(3120).mp4 594MB
  7. NA-81- Walkthrough - Optimum(2830).mp4 540MB
  8. NA-78- Walkthrough - Devel(2842).mp4 526MB
  9. NA-82- Walkthrough - Bashed(3016).mp4 524MB
  10. NA-58- Enumerating HTTP and HTTPS Part 2(1508).mp4 519MB
  11. NA-84- Walkthrough - Netmon(2549).mp4 519MB
  12. NA-124- Domain Enumeration with PowerView(1517).mp4 456MB
  13. NA-42- Building a Port Scanner(1906).mp4 447MB
  14. NA-72- Credential Spraying and Password Stuffing(1402).mp4 436MB
  15. NA-70- Manual Exploitation(1240).mp4 432MB
  16. NA-56- Scanning with Nmap(1946).mp4 406MB
  17. NA-188- 002_WPA_PS2_Exploit_Walkthrough(1312).mp4 403MB
  18. NA-61- Researching Potential Vulnerabilities(1449).mp4 400MB
  19. NA-57- Enumerating HTTP and HTTPS Part 1(1501).mp4 391MB
  20. NA-83- Walkthrough - Grandpa(1431).mp4 374MB
  21. NA-166- Exploring Burp Suite(1128).mp4 357MB
  22. NA-102- Setting Up Users, Groups, and Policies(1528).mp4 337MB
  23. NA-107- Password Cracking with Hashcat(1131).mp4 330MB
  24. NA-65- Scanning with Nessus Part 1(1034).mp4 324MB
  25. NA-19- Navigating the File System(1159).mp4 308MB
  26. NA-59- Enumerating SMB(1419).mp4 304MB
  27. NA-8- IP Addresses(1306).mp4 299MB
  28. NA-52- Information Gathering with Burp Suite(848).mp4 293MB
  29. NA-169- SQL Injection Walkthrough(1006).mp4 291MB
  30. NA-191- 003_Reviewing_a_Real_Pentest_Report(1232).mp4 283MB
  31. NA-163- The OWASP Top 10 and OWASP Testing Checklist(1026).mp4 275MB
  32. NA-26- Scripting with Bash(2234).mp4 261MB
  33. NA-159- Finding Alive Domains with Httprobe(714).mp4 256MB
  34. NA-71- Brute Force Attacks(749).mp4 251MB
  35. NA-39- Advanced Strings(1319).mp4 245MB
  36. NA-174- Testing for Sensitive Data Exposure(801).mp4 241MB
  37. NA-20- Users and Privileges(923).mp4 239MB
  38. NA-15- Installing VMWare VirtualBox(615).mp4 237MB
  39. NA-103- Joining Our Machines to the Domain(848).mp4 237MB
  40. NA-100- Setting Up the Domain Controllers(1302).mp4 236MB
  41. NA-190- 002_Pentest_Report_Writing(1116).mp4 233MB
  42. NA-180- Cross-Site Scripting (XSS) Overview(1033).mp4 232MB
  43. NA-176- XXE Attack and Defense(803).mp4 229MB
  44. NA-92- Finding the Right Module(826).mp4 227MB
  45. NA-171- Broken Authentication Overview and Defenses(543).mp4 227MB
  46. NA-47- Gathering Breached Credentials with Breach-Parse(717).mp4 222MB
  47. NA-21- Common Network Commands(552).mp4 218MB
  48. NA-119- IPv6 DNS Takeover via mitm6(743).mp4 217MB
  49. NA-143- Abusing GPP Part 1(846).mp4 216MB
  50. NA-146- Credential Dumping with Mimikatz(920).mp4 213MB
  51. NA-172- Testing for Broken Authentication(739).mp4 209MB
  52. NA-23- Installing and Updating Tools(907).mp4 208MB
  53. NA-173- Sensitive Data Exposure Overview and Defenses(453).mp4 208MB
  54. NA-115- Gaining Shell Access(746).mp4 204MB
  55. NA-144- Abusing GPP Part 2(412).mp4 200MB
  56. NA-179- Security Misconfiguration Attacks and Defenses(458).mp4 196MB
  57. NA-31- Functions(1054).mp4 194MB
  58. NA-181- Reflected XSS Walkthrough(622).mp4 191MB
  59. NA-30- Variables and Methods(1112).mp4 190MB
  60. NA-49- Hunting Subdomains Part 1(531).mp4 190MB
  61. NA-35- Lists(1022).mp4 190MB
  62. NA-69- Gaining Root with Metasploit(740).mp4 189MB
  63. NA-164- Installing OWASP Juice Shop(648).mp4 188MB
  64. NA-94- Exploit Development Using Python3 and Mona(1339).mp4 178MB
  65. NA-184- Insecure Deserialization(433).mp4 178MB
  66. NA-112- SMB Relay Attack Demonstration Part 1(454).mp4 176MB
  67. NA-105- LLMNR Poisoning Overview(726).mp4 174MB
  68. NA-51- Identifying Website Technologies(706).mp4 173MB
  69. NA-134- Pass the Hash Attacks(538).mp4 171MB
  70. NA-131- Pass the Password Attacks(620).mp4 171MB
  71. NA-147- Golden Ticket Attacks(718).mp4 170MB
  72. NA-2- Course Discord (Important)(327).mp4 167MB
  73. NA-53- Google Fu(531).mp4 167MB
  74. NA-158- Finding Subdomains with Amass(527).mp4 166MB
  75. NA-34- Conditional Statements(855).mp4 164MB
  76. NA-5- Part 1 - Effective Notekeeping(639).mp4 162MB
  77. NA-74- Introduction(802).mp4 161MB
  78. NA-152- Pivoting Lab Setup(630).mp4 161MB
  79. NA-161- Automating the Enumeration Process(546).mp4 161MB
  80. NA-6- Part 2 - Important Tools(520).mp4 161MB
  81. NA-137- Token Impersonation with Incognito(703).mp4 157MB
  82. NA-153- Pivoting Walkthrough(607).mp4 154MB
  83. NA-185- Using Components with Known Vulnerabilities(438).mp4 150MB
  84. NA-156- Installing Go(358).mp4 146MB
  85. NA-66- Scanning with Nessus Part 2(619).mp4 143MB
  86. NA-106- Capturing NTLMv2 Hashes with Responder(446).mp4 143MB
  87. NA-182- Stored XSS Walkthrough(616).mp4 143MB
  88. NA-50- Hunting Subdomains Part 2(448).mp4 142MB
  89. NA-148- Conclusion and Additional Resources(624).mp4 141MB
  90. NA-89- Finding the Offset(519).mp4 141MB
  91. NA-48- Utilizing theharvester(338).mp4 139MB
  92. NA-187- 001_Wireless_Penetration_Testing_Overview(1026).mp4 139MB
  93. NA-40- Dictionaries(731).mp4 138MB
  94. NA-85- Required Installations(616).mp4 137MB
  95. NA-16- Installing Kali Linux(629).mp4 135MB
  96. NA-177- Broken Access Control Overview(329).mp4 133MB
  97. NA-87- Spiking(1011).mp4 132MB
  98. NA-33- Relational and Boolean Operators(654).mp4 126MB
  99. NA-67- Reverse Shells vs Bind Shells(700).mp4 125MB
  100. NA-111- Discovering Hosts with SMB Signing Disabled(336).mp4 122MB
  101. NA-140- Kerberoasting Walkthrough(351).mp4 118MB
  102. NA-157- Finding Subdomains with Assetfinder(743).mp4 116MB
  103. NA-14- Subnetting Part 2(413).mp4 115MB
  104. NA-186- Insufficient Logging and Monitoring(312).mp4 114MB
  105. NA-9- MAC Addresses(313).mp4 113MB
  106. NA-101- Setting Up the User Machines(752).mp4 112MB
  107. NA-28- Strings(728).mp4 111MB
  108. NA-127- Enumerating Domain Data with Bloodhound(734).mp4 110MB
  109. NA-192- 001_Career_Advice(1110).mp4 109MB
  110. NA-4- A Day in the Life of an Ethical Hacker(1649).mp4 107MB
  111. NA-113- SMB Relay Attack Demonstration Part 2(407).mp4 106MB
  112. NA-25- Viewing, Creating, and Editing Files(559).mp4 103MB
  113. NA-178- Broken Access Control Walkthrough(428).mp4 103MB
  114. NA-91- Finding Bad Characters(607).mp4 102MB
  115. NA-38- Importing Modules(602).mp4 101MB
  116. NA-145- Mimikatz Overview(536).mp4 100MB
  117. NA-160- Screenshotting Websites with GoWitness(329).mp4 95MB
  118. NA-125- Bloodhound Overview and Setup(332).mp4 95MB
  119. NA-29- Math(554).mp4 95MB
  120. NA-109- SMB Relay Attacks Overview(523).mp4 94MB
  121. NA-54- Utilizing Social Media(537).mp4 93MB
  122. NA-37- Looping(458).mp4 92MB
  123. NA-93- Generating Shellcode and Gaining Root(556).mp4 90MB
  124. NA-133- Cracking NTLM Hashes with Hashcat(306).mp4 89MB
  125. NA-41- Sockets(528).mp4 88MB
  126. NA-10- TCP, UDP, and the Three-Way Handshake(512).mp4 87MB
  127. NA-60- Enumerating SSH(409).mp4 83MB
  128. NA-139- Kerberoasting Overview(511).mp4 83MB
  129. NA-32- Boolean Expressions(429).mp4 81MB
  130. NA-175- XML External Entities (XXE) Overview(954).mp4 78MB
  131. NA-132- Dumping Hashes with secretsdump.py(311).mp4 77MB
  132. NA-63- Scanning with Masscan(622).mp4 77MB
  133. NA-126- Grabbing Data with Invoke-Bloodhound(311).mp4 73MB
  134. NA-64- Scanning with Metasploit(254).mp4 71MB
  135. NA-121- Other Attack Vectors and Strategies(843).mp4 70MB
  136. NA-45- Identifying Our Target(333).mp4 70MB
  137. NA-18- Sudo Overview(512).mp4 69MB
  138. NA-120- IPv6 Attack Defenses(300).mp4 69MB
  139. NA-104- Introduction(355).mp4 68MB
  140. NA-189- 001_Common_Legal_Documents(717).mp4 68MB
  141. NA-95- Active Directory Overview(513).mp4 66MB
  142. NA-55- Installing Kioptrix(617).mp4 66MB
  143. NA-97- Logical Active Directory Components(728).mp4 66MB
  144. NA-88- Fuzzing(609).mp4 66MB
  145. NA-142- GPP cPassword Attacks Overview(322).mp4 64MB
  146. NA-108- LLMNR Poisoning Defense(248).mp4 63MB
  147. NA-96- Physical Active Directory Components(545).mp4 61MB
  148. NA-17- Exploring Kali Linux(328).mp4 61MB
  149. NA-86- Buffer Overflows Explained(408).mp4 60MB
  150. NA-46- Email Gathering with Hunter.io(515).mp4 59MB
  151. NA-167- Introducing the Score Board(250).mp4 59MB
  152. NA-123- PowerView Overview(213).mp4 58MB
  153. NA-73- Our Notes, Revisited(303).mp4 57MB
  154. NA-129- Pass the Hash Password Overview(304).mp4 57MB
  155. NA-44- Passive Reconnaissance Overview(732).mp4 56MB
  156. NA-99- Downloading Necessary ISOs(247).mp4 56MB
  157. NA-168- SQL Injection Attacks Overview(512).mp4 55MB
  158. NA-165- Installing Foxy Proxy(213).mp4 51MB
  159. NA-11- Common Ports and Protocols(609).mp4 48MB
  160. NA-62- Our Notes So Far(306).mp4 48MB
  161. NA-138- Token Impersonation Mitigation(243).mp4 47MB
  162. NA-136- Token Impersonation Overview(348).mp4 46MB
  163. NA-36- Tuples(230).mp4 46MB
  164. NA-118- Setting Up LDAPS(224).mp4 46MB
  165. NA-135- Pass Attack Mitigations(242).mp4 46MB
  166. NA-12- The OSI Model(530).mp4 39MB
  167. NA-114- SMB Relay Attack Defenses(233).mp4 38MB
  168. NA-68- Staged vs Non-Staged Payloads(321).mp4 37MB
  169. NA-43- The Five Stages of Ethical Hacking(516).mp4 36MB
  170. NA-90- Overwriting the EIP(324).mp4 35MB
  171. NA-117- Installing mitm6(118).mp4 34MB
  172. NA-183- Preventing XSS(348).mp4 33MB
  173. NA-22- Network Commands Update(155).mp4 29MB
  174. NA-170- SQL Injection Defenses(249).mp4 25MB
  175. NA-110- Quick Lab Update(058).mp4 25MB
  176. NA-3- FAQ - Important(100).mp4 24MB
  177. NA-116- IPv6 Attacks Overview(400).mp4 24MB
  178. NA-130- Installing crackmapexec(038).mp4 23MB
  179. NA-141- Kerberoasting Mitigation(109).mp4 23MB
  180. NA-1- Course Introduction(257).mp4 22MB
  181. NA-150- File Transfers Review(232).mp4 22MB
  182. NA-151- Maintaining Access Overview(332).mp4 20MB
  183. NA-98- Lab Overview and Requirements(301).mp4 20MB
  184. NA-24- Installing gedit(139).mp4 17MB
  185. NA-27- Introduction(219).mp4 16MB
  186. NA-154- Cleaning Up(248).mp4 14MB
  187. NA-162- Introduction(136).mp4 10MB
  188. NA-7- Introduction(111).mp4 9MB
  189. NA-155- Introduction(149).mp4 8MB
  190. NA-122- Introduction(201).mp4 8MB
  191. NA-149- Introduction(149).mp4 6MB
  192. NA-128- Introduction(103).mp4 6MB