589689.xyz

Sans-SEC560_Network_Penetration_Testing_and_Ethical_Hacking-caz4/

  • 收录时间:2018-03-15 18:18:23
  • 文件大小:12GB
  • 下载次数:238
  • 最近下载:2020-12-31 18:48:07
  • 磁力链接:

文件列表

  1. Section1-Comprehensive_pen_test_planning,Scoping,and_recon/1.1_Pen_Testing_foundations/4.mp4 116MB
  2. Section1-Comprehensive_pen_test_planning,Scoping,and_recon/1.1_Pen_Testing_foundations/22.mp4 85MB
  3. SelfStudy/SEC560_2A_C01.mp3 83MB
  4. Section1-Comprehensive_pen_test_planning,Scoping,and_recon/1.1_Pen_Testing_foundations/17.mp4 61MB
  5. Section1-Comprehensive_pen_test_planning,Scoping,and_recon/1.1_Pen_Testing_foundations/42.mp4 58MB
  6. SelfStudy/SEC560_2B_C01.mp3 50MB
  7. Section5-In-Depth_Password_Attack_and_Web_App/5.2_Advanced_Password_Attacks/SANS OnDemand_1 (49).mp4 47MB
  8. SelfStudy/SEC560_2C_C01.mp3 44MB
  9. Section3-Exploitation/3.1_Exploitation_Fundamentals/19.mp4 43MB
  10. Section5-In-Depth_Password_Attack_and_Web_App/5.2_Advanced_Password_Attacks/SANS OnDemand_1 (2).mp4 42MB
  11. Section3-Exploitation/3.2_Metasploit/7.mp4 42MB
  12. Section1-Comprehensive_pen_test_planning,Scoping,and_recon/1.1_Pen_Testing_foundations/36.mp4 42MB
  13. Section1-Comprehensive_pen_test_planning,Scoping,and_recon/1.2_Pen_Testing_Process/23.mp4 41MB
  14. Section2-In-Depth_Scanning/2.1_Scanning_for_Targets/17.mp4 40MB
  15. Section1-Comprehensive_pen_test_planning,Scoping,and_recon/1.2_Pen_Testing_Process/5.mp4 40MB
  16. Section5-In-Depth_Password_Attack_and_Web_App/5.3_Pass_The_Hash_Attacks/SANS OnDemand_28_2.mp4 40MB
  17. Section1-Comprehensive_pen_test_planning,Scoping,and_recon/1.1_Pen_Testing_foundations/1.mp4 40MB
  18. Section2-In-Depth_Scanning/2.1_Scanning_for_Targets/44.mp4 40MB
  19. Section1-Comprehensive_pen_test_planning,Scoping,and_recon/1.2_Pen_Testing_Process/16.mp4 39MB
  20. Section3-Exploitation/3.1_Exploitation_Fundamentals/7.mp4 39MB
  21. Section2-In-Depth_Scanning/2.2_Profiling_the_Target/35.mp4 39MB
  22. Section4-Post-Exploitation_and_Merciless_Pivoting/4.5_Password_Attacks/SANS OnDemand_47_2.mp4 39MB
  23. Section5-In-Depth_Password_Attack_and_Web_App/5.2_Advanced_Password_Attacks/SANS OnDemand_1 (51).mp4 39MB
  24. Section3-Exploitation/3.1_Exploitation_Fundamentals/6.mp4 39MB
  25. Section3-Exploitation/3.1_Exploitation_Fundamentals/14.mp4 39MB
  26. Section2-In-Depth_Scanning/2.1_Scanning_for_Targets/39.mp4 39MB
  27. Section1-Comprehensive_pen_test_planning,Scoping,and_recon/1.3_Reconnaissance/39.mp4 39MB
  28. Section4-Post-Exploitation_and_Merciless_Pivoting/4.4_Powershell_Kung_Fu_For_Penetration_Testers/SANS OnDemand_35.mp4 38MB
  29. Section3-Exploitation/3.1_Exploitation_Fundamentals/13.mp4 38MB
  30. Section2-In-Depth_Scanning/2.1_Scanning_for_Targets/27.mp4 38MB
  31. Section1-Comprehensive_pen_test_planning,Scoping,and_recon/1.3_Reconnaissance/27.mp4 38MB
  32. Section4-Post-Exploitation_and_Merciless_Pivoting/4.2_Windows_Command_Line_Kung_Fu_for_Penetration_Testing/SANS OnDemand_38.mp4 38MB
  33. Section0-Getting_Started_with_Your_OnDemand_course/0.1_Welcome_to_Your_Sans_OnDemand_Course/8.mp4 37MB
  34. Section4-Post-Exploitation_and_Merciless_Pivoting/4.3_Remotely_Run_Windows_Commands/SANS OnDemand_27_2.mp4 37MB
  35. Section2-In-Depth_Scanning/2.1_Scanning_for_Targets/56.mp4 37MB
  36. Section2-In-Depth_Scanning/2.1_Scanning_for_Targets/38.mp4 37MB
  37. Section1-Comprehensive_pen_test_planning,Scoping,and_recon/1.3_Reconnaissance/38.mp4 37MB
  38. Section2-In-Depth_Scanning/2.1_Scanning_for_Targets/50.mp4 37MB
  39. Section2-In-Depth_Scanning/2.1_Scanning_for_Targets/34.mp4 37MB
  40. Section1-Comprehensive_pen_test_planning,Scoping,and_recon/1.3_Reconnaissance/34.mp4 37MB
  41. Section1-Comprehensive_pen_test_planning,Scoping,and_recon/1.1_Pen_Testing_foundations/25.mp4 36MB
  42. Section1-Comprehensive_pen_test_planning,Scoping,and_recon/1.1_Pen_Testing_foundations/13.mp4 36MB
  43. Section3-Exploitation/3.2_Metasploit/44.mp4 36MB
  44. Section1-Comprehensive_pen_test_planning,Scoping,and_recon/1.3_Reconnaissance/29webm.mp4 36MB
  45. Section3-Exploitation/3.3_AV_Evasion_with_Veil-Evision/3.mp4 36MB
  46. Section5-In-Depth_Password_Attack_and_Web_App/5.2_Advanced_Password_Attacks/SANS OnDemand_1 (46).mp4 36MB
  47. Section3-Exploitation/3.6_Post_Exploitation_with_Empire/SANS OnDemand_29.mp4 35MB
  48. Section3-Exploitation/3.2_Metasploit/14.mp4 35MB
  49. Section3-Exploitation/3.1_Exploitation_Fundamentals/18.mp4 35MB
  50. Section1-Comprehensive_pen_test_planning,Scoping,and_recon/1.3_Reconnaissance/9.mp4 35MB
  51. Section1-Comprehensive_pen_test_planning,Scoping,and_recon/1.1_Pen_Testing_foundations/43.mp4 35MB
  52. Section4-Post-Exploitation_and_Merciless_Pivoting/4.6_Password_Representation_Formats/SANS OnDemand_38.mp4 34MB
  53. Section2-In-Depth_Scanning/2.1_Scanning_for_Targets/11.mp4 34MB
  54. Section5-In-Depth_Password_Attack_and_Web_App/5.2_Advanced_Password_Attacks/SANS OnDemand_1 (4).mp4 34MB
  55. Section4-Post-Exploitation_and_Merciless_Pivoting/4.3_Remotely_Run_Windows_Commands/SANS OnDemand_33_2.mp4 34MB
  56. Section1-Comprehensive_pen_test_planning,Scoping,and_recon/1.1_Pen_Testing_foundations/9.mp4 34MB
  57. Section5-In-Depth_Password_Attack_and_Web_App/5.4_Web_Vulnerability_Scanning_and_Web_Proxies/SANS OnDemand_40.mp4 34MB
  58. Section1-Comprehensive_pen_test_planning,Scoping,and_recon/1.1_Pen_Testing_foundations/3.mp4 34MB
  59. Section5-In-Depth_Password_Attack_and_Web_App/5.5_Injection_Attacks/a (64).mp4 34MB
  60. Section6-Peneteration_Test_and_Capture_the_Flag_Workshop/6.1_Penteration_Testing_Workshop/SANS OnDemand_27_2.mp4 34MB
  61. Section5-In-Depth_Password_Attack_and_Web_App/5.5_Injection_Attacks/a (77).mp4 34MB
  62. Section2-In-Depth_Scanning/2.1_Scanning_for_Targets/15.mp4 34MB
  63. Section3-Exploitation/3.2_Metasploit/48.mp4 33MB
  64. Section4-Post-Exploitation_and_Merciless_Pivoting/4.2_Windows_Command_Line_Kung_Fu_for_Penetration_Testing/SANS OnDemand_57.mp4 33MB
  65. Section4-Post-Exploitation_and_Merciless_Pivoting/4.4_Powershell_Kung_Fu_For_Penetration_Testers/SANS OnDemand_46.mp4 33MB
  66. Section4-Post-Exploitation_and_Merciless_Pivoting/4.4_Powershell_Kung_Fu_For_Penetration_Testers/SANS OnDemand_36.mp4 33MB
  67. Section2-In-Depth_Scanning/2.2_Profiling_the_Target/39.mp4 33MB
  68. Section4-Post-Exploitation_and_Merciless_Pivoting/4.1_Moving_Files_with_Exploits/SANS OnDemand_33_2.mp4 33MB
  69. Section2-In-Depth_Scanning/2.1_Scanning_for_Targets/13.mp4 33MB
  70. Section1-Comprehensive_pen_test_planning,Scoping,and_recon/1.2_Pen_Testing_Process/3.mp4 33MB
  71. Section1-Comprehensive_pen_test_planning,Scoping,and_recon/1.2_Pen_Testing_Process/20.mp4 33MB
  72. Section2-In-Depth_Scanning/2.1_Scanning_for_Targets/24.mp4 33MB
  73. Section1-Comprehensive_pen_test_planning,Scoping,and_recon/1.3_Reconnaissance/24.mp4 33MB
  74. Section6-Peneteration_Test_and_Capture_the_Flag_Workshop/6.1_Penteration_Testing_Workshop/SANS OnDemand_52_2.mp4 33MB
  75. Section3-Exploitation/3.1_Exploitation_Fundamentals/5.mp4 32MB
  76. Section1-Comprehensive_pen_test_planning,Scoping,and_recon/1.2_Pen_Testing_Process/48.mp4 32MB
  77. Section4-Post-Exploitation_and_Merciless_Pivoting/4.3_Remotely_Run_Windows_Commands/SANS OnDemand_32_2.mp4 32MB
  78. Section1-Comprehensive_pen_test_planning,Scoping,and_recon/1.1_Pen_Testing_foundations/5.mp4 32MB
  79. Section5-In-Depth_Password_Attack_and_Web_App/5.1_Overview_of_Password_Attack_and_Web_App_Pen_Tensting/SANS OnDemand_27.mp4 32MB
  80. Section3-Exploitation/3.2_Metasploit/13.mp4 31MB
  81. Section3-Exploitation/3.2_Metasploit/10.mp4 31MB
  82. Section1-Comprehensive_pen_test_planning,Scoping,and_recon/1.1_Pen_Testing_foundations/47.mp4 31MB
  83. Section1-Comprehensive_pen_test_planning,Scoping,and_recon/1.2_Pen_Testing_Process/14.mp4 31MB
  84. Section1-Comprehensive_pen_test_planning,Scoping,and_recon/1.2_Pen_Testing_Process/9.mp4 31MB
  85. Section4-Post-Exploitation_and_Merciless_Pivoting/4.3_Remotely_Run_Windows_Commands/SANS OnDemand_36_2.mp4 31MB
  86. Section1-Comprehensive_pen_test_planning,Scoping,and_recon/1.1_Pen_Testing_foundations/21.mp4 31MB
  87. Section3-Exploitation/3.2_Metasploit/9.mp4 31MB
  88. Section6-Peneteration_Test_and_Capture_the_Flag_Workshop/6.1_Penteration_Testing_Workshop/SANS OnDemand_51_2.mp4 31MB
  89. Section2-In-Depth_Scanning/2.1_Scanning_for_Targets/33.mp4 31MB
  90. Section1-Comprehensive_pen_test_planning,Scoping,and_recon/1.3_Reconnaissance/33.mp4 31MB
  91. Section1-Comprehensive_pen_test_planning,Scoping,and_recon/1.1_Pen_Testing_foundations/46.mp4 31MB
  92. Section2-In-Depth_Scanning/2.1_Scanning_for_Targets/9.mp4 31MB
  93. Section5-In-Depth_Password_Attack_and_Web_App/5.2_Advanced_Password_Attacks/SANS OnDemand_1 (14).mp4 31MB
  94. Section1-Comprehensive_pen_test_planning,Scoping,and_recon/1.1_Pen_Testing_foundations/34.mp4 31MB
  95. Section2-In-Depth_Scanning/2.4_Enumerating_Users/3.mp4 31MB
  96. Section5-In-Depth_Password_Attack_and_Web_App/5.5_Injection_Attacks/a (21).mp4 31MB
  97. Section1-Comprehensive_pen_test_planning,Scoping,and_recon/1.1_Pen_Testing_foundations/44.mp4 30MB
  98. Section4-Post-Exploitation_and_Merciless_Pivoting/4.2_Windows_Command_Line_Kung_Fu_for_Penetration_Testing/SANS OnDemand_34.mp4 30MB
  99. Section2-In-Depth_Scanning/2.1_Scanning_for_Targets/28.mp4 30MB
  100. Section1-Comprehensive_pen_test_planning,Scoping,and_recon/1.3_Reconnaissance/28.mp4 30MB
  101. Section4-Post-Exploitation_and_Merciless_Pivoting/4.5_Password_Attacks/SANS OnDemand_28_2.mp4 30MB
  102. Section4-Post-Exploitation_and_Merciless_Pivoting/4.1_Moving_Files_with_Exploits/SANS OnDemand_28_2.mp4 30MB
  103. Section3-Exploitation/3.4_Metasploit_Database_and_Tool_Integration/SANS OnDemand_9.mp4 30MB
  104. Section1-Comprehensive_pen_test_planning,Scoping,and_recon/1.1_Pen_Testing_foundations/6.mp4 30MB
  105. Section2-In-Depth_Scanning/2.2_Profiling_the_Target/26.mp4 30MB
  106. Section1-Comprehensive_pen_test_planning,Scoping,and_recon/1.2_Pen_Testing_Process/15.mp4 30MB
  107. Section4-Post-Exploitation_and_Merciless_Pivoting/4.4_Powershell_Kung_Fu_For_Penetration_Testers/SANS OnDemand_39.mp4 30MB
  108. Section4-Post-Exploitation_and_Merciless_Pivoting/4.4_Powershell_Kung_Fu_For_Penetration_Testers/SANS OnDemand_54.mp4 30MB
  109. Section3-Exploitation/3.1_Exploitation_Fundamentals/2.mp4 29MB
  110. Section1-Comprehensive_pen_test_planning,Scoping,and_recon/1.1_Pen_Testing_foundations/20.mp4 29MB
  111. Section1-Comprehensive_pen_test_planning,Scoping,and_recon/1.2_Pen_Testing_Process/55.mp4 29MB
  112. Section5-In-Depth_Password_Attack_and_Web_App/5.5_Injection_Attacks/a (37).mp4 29MB
  113. Section1-Comprehensive_pen_test_planning,Scoping,and_recon/1.1_Pen_Testing_foundations/12.mp4 29MB
  114. Section1-Comprehensive_pen_test_planning,Scoping,and_recon/1.3_Reconnaissance/5.mp4 29MB
  115. Section2-In-Depth_Scanning/2.4_Enumerating_Users/14.mp4 29MB
  116. Section4-Post-Exploitation_and_Merciless_Pivoting/4.4_Powershell_Kung_Fu_For_Penetration_Testers/SANS OnDemand_37.mp4 29MB
  117. Section5-In-Depth_Password_Attack_and_Web_App/5.5_Injection_Attacks/a (9).mp4 29MB
  118. Section5-In-Depth_Password_Attack_and_Web_App/5.2_Advanced_Password_Attacks/SANS OnDemand_1 (47).mp4 29MB
  119. Section5-In-Depth_Password_Attack_and_Web_App/5.3_Pass_The_Hash_Attacks/SANS OnDemand_37.mp4 29MB
  120. Section3-Exploitation/3.6_Post_Exploitation_with_Empire/SANS OnDemand_30.mp4 29MB
  121. Section1-Comprehensive_pen_test_planning,Scoping,and_recon/1.3_Reconnaissance/48.mp4 29MB
  122. Section4-Post-Exploitation_and_Merciless_Pivoting/4.4_Powershell_Kung_Fu_For_Penetration_Testers/SANS OnDemand_27.mp4 28MB
  123. Section4-Post-Exploitation_and_Merciless_Pivoting/4.4_Powershell_Kung_Fu_For_Penetration_Testers/SANS OnDemand_42.mp4 28MB
  124. Section2-In-Depth_Scanning/2.2_Profiling_the_Target/33.mp4 28MB
  125. Section4-Post-Exploitation_and_Merciless_Pivoting/4.6_Password_Representation_Formats/SANS OnDemand_29.mp4 28MB
  126. Section5-In-Depth_Password_Attack_and_Web_App/5.4_Web_Vulnerability_Scanning_and_Web_Proxies/SANS OnDemand_44.mp4 28MB
  127. Section3-Exploitation/3.6_Post_Exploitation_with_Empire/SANS OnDemand_58.mp4 28MB
  128. Section4-Post-Exploitation_and_Merciless_Pivoting/4.1_Moving_Files_with_Exploits/SANS OnDemand_26_2.mp4 28MB
  129. Section4-Post-Exploitation_and_Merciless_Pivoting/4.5_Password_Attacks/SANS OnDemand_37_2.mp4 28MB
  130. Section2-In-Depth_Scanning/2.1_Scanning_for_Targets/10.mp4 28MB
  131. Section3-Exploitation/3.1_Exploitation_Fundamentals/15.mp4 28MB
  132. Section4-Post-Exploitation_and_Merciless_Pivoting/4.3_Remotely_Run_Windows_Commands/SANS OnDemand_35_2.mp4 28MB
  133. Section4-Post-Exploitation_and_Merciless_Pivoting/4.2_Windows_Command_Line_Kung_Fu_for_Penetration_Testing/SANS OnDemand_58.mp4 28MB
  134. Section5-In-Depth_Password_Attack_and_Web_App/5.2_Advanced_Password_Attacks/SANS OnDemand_1 (48).mp4 28MB
  135. Section1-Comprehensive_pen_test_planning,Scoping,and_recon/1.1_Pen_Testing_foundations/28.mp4 28MB
  136. Section1-Comprehensive_pen_test_planning,Scoping,and_recon/1.2_Pen_Testing_Process/24.mp4 28MB
  137. Section5-In-Depth_Password_Attack_and_Web_App/5.2_Advanced_Password_Attacks/SANS OnDemand_1 (10).mp4 27MB
  138. Section2-In-Depth_Scanning/2.1_Scanning_for_Targets/58.mp4 27MB
  139. Section2-In-Depth_Scanning/2.2_Profiling_the_Target/36.mp4 27MB
  140. Section1-Comprehensive_pen_test_planning,Scoping,and_recon/1.2_Pen_Testing_Process/43.mp4 27MB
  141. Section4-Post-Exploitation_and_Merciless_Pivoting/4.3_Remotely_Run_Windows_Commands/SANS OnDemand_37_2.mp4 27MB
  142. Section4-Post-Exploitation_and_Merciless_Pivoting/4.5_Password_Attacks/SANS OnDemand_31_2.mp4 27MB
  143. Section4-Post-Exploitation_and_Merciless_Pivoting/4.2_Windows_Command_Line_Kung_Fu_for_Penetration_Testing/SANS OnDemand_61.mp4 27MB
  144. Section4-Post-Exploitation_and_Merciless_Pivoting/4.7_Advanced_Hash_Manipulation/SANS OnDemand_56.mp4 27MB
  145. Section3-Exploitation/3.2_Metasploit/8.mp4 27MB
  146. Section5-In-Depth_Password_Attack_and_Web_App/5.5_Injection_Attacks/a (19).mp4 27MB
  147. Section4-Post-Exploitation_and_Merciless_Pivoting/4.4_Powershell_Kung_Fu_For_Penetration_Testers/SANS OnDemand_40.mp4 27MB
  148. Section4-Post-Exploitation_and_Merciless_Pivoting/4.3_Remotely_Run_Windows_Commands/SANS OnDemand_40_2.mp4 27MB
  149. Section2-In-Depth_Scanning/2.1_Scanning_for_Targets/53.mp4 27MB
  150. Section2-In-Depth_Scanning/2.2_Profiling_the_Target/17.mp4 27MB
  151. Section2-In-Depth_Scanning/2.2_Profiling_the_Target/20.mp4 26MB
  152. Section3-Exploitation/3.6_Post_Exploitation_with_Empire/SANS OnDemand_27.mp4 26MB
  153. Section4-Post-Exploitation_and_Merciless_Pivoting/4.4_Powershell_Kung_Fu_For_Penetration_Testers/SANS OnDemand_31.mp4 26MB
  154. Section2-In-Depth_Scanning/2.2_Profiling_the_Target/5.mp4 26MB
  155. Section4-Post-Exploitation_and_Merciless_Pivoting/4.1_Moving_Files_with_Exploits/SANS OnDemand_29_2.mp4 26MB
  156. Section4-Post-Exploitation_and_Merciless_Pivoting/4.2_Windows_Command_Line_Kung_Fu_for_Penetration_Testing/SANS OnDemand_55.mp4 26MB
  157. Section5-In-Depth_Password_Attack_and_Web_App/5.5_Injection_Attacks/a (84).mp4 26MB
  158. Section4-Post-Exploitation_and_Merciless_Pivoting/4.4_Powershell_Kung_Fu_For_Penetration_Testers/SANS OnDemand_52.mp4 26MB
  159. Section2-In-Depth_Scanning/2.3_vulnerability_Scanning/7.mp4 26MB
  160. Section1-Comprehensive_pen_test_planning,Scoping,and_recon/1.2_Pen_Testing_Process/26.mp4 26MB
  161. Section2-In-Depth_Scanning/2.2_Profiling_the_Target/3.mp4 26MB
  162. Section4-Post-Exploitation_and_Merciless_Pivoting/4.4_Powershell_Kung_Fu_For_Penetration_Testers/SANS OnDemand_51.mp4 25MB
  163. Section1-Comprehensive_pen_test_planning,Scoping,and_recon/1.1_Pen_Testing_foundations/40.mp4 25MB
  164. Section5-In-Depth_Password_Attack_and_Web_App/5.5_Injection_Attacks/a (86).mp4 25MB
  165. Section4-Post-Exploitation_and_Merciless_Pivoting/4.4_Powershell_Kung_Fu_For_Penetration_Testers/SANS OnDemand_53.mp4 25MB
  166. Section5-In-Depth_Password_Attack_and_Web_App/5.1_Overview_of_Password_Attack_and_Web_App_Pen_Tensting/SANS OnDemand_28.mp4 25MB
  167. Section3-Exploitation/3.2_Metasploit/3.mp4 25MB
  168. Section4-Post-Exploitation_and_Merciless_Pivoting/4.2_Windows_Command_Line_Kung_Fu_for_Penetration_Testing/SANS OnDemand_48.mp4 25MB
  169. Section3-Exploitation/3.1_Exploitation_Fundamentals/12.mp4 25MB
  170. Section5-In-Depth_Password_Attack_and_Web_App/5.2_Advanced_Password_Attacks/SANS OnDemand_1 (3).mp4 25MB
  171. Section2-In-Depth_Scanning/2.4_Enumerating_Users/8.mp4 25MB
  172. Section2-In-Depth_Scanning/2.1_Scanning_for_Targets/54.mp4 25MB
  173. Section3-Exploitation/3.6_Post_Exploitation_with_Empire/SANS OnDemand_31.mp4 25MB
  174. Section4-Post-Exploitation_and_Merciless_Pivoting/4.1_Moving_Files_with_Exploits/SANS OnDemand_38_2.mp4 25MB
  175. Section3-Exploitation/3.2_Metasploit/15.mp4 25MB
  176. Section1-Comprehensive_pen_test_planning,Scoping,and_recon/1.1_Pen_Testing_foundations/52.mp4 24MB
  177. Section1-Comprehensive_pen_test_planning,Scoping,and_recon/1.2_Pen_Testing_Process/4.mp4 24MB
  178. Section1-Comprehensive_pen_test_planning,Scoping,and_recon/1.2_Pen_Testing_Process/19.mp4 24MB
  179. Section2-In-Depth_Scanning/2.1_Scanning_for_Targets/26.mp4 24MB
  180. Section1-Comprehensive_pen_test_planning,Scoping,and_recon/1.3_Reconnaissance/26.mp4 24MB
  181. Section4-Post-Exploitation_and_Merciless_Pivoting/4.2_Windows_Command_Line_Kung_Fu_for_Penetration_Testing/SANS OnDemand_31.mp4 24MB
  182. Section5-In-Depth_Password_Attack_and_Web_App/5.2_Advanced_Password_Attacks/SANS OnDemand_1 (26).mp4 24MB
  183. Section2-In-Depth_Scanning/2.1_Scanning_for_Targets/47.mp4 24MB
  184. Section1-Comprehensive_pen_test_planning,Scoping,and_recon/1.1_Pen_Testing_foundations/35.mp4 24MB
  185. Section4-Post-Exploitation_and_Merciless_Pivoting/4.4_Powershell_Kung_Fu_For_Penetration_Testers/SANS OnDemand_30.mp4 24MB
  186. Section1-Comprehensive_pen_test_planning,Scoping,and_recon/1.1_Pen_Testing_foundations/15.mp4 24MB
  187. Section1-Comprehensive_pen_test_planning,Scoping,and_recon/1.1_Pen_Testing_foundations/45.mp4 23MB
  188. Section1-Comprehensive_pen_test_planning,Scoping,and_recon/1.1_Pen_Testing_foundations/38.mp4 23MB
  189. Section1-Comprehensive_pen_test_planning,Scoping,and_recon/1.1_Pen_Testing_foundations/50.mp4 23MB
  190. Section2-In-Depth_Scanning/2.1_Scanning_for_Targets/46.mp4 23MB
  191. Section1-Comprehensive_pen_test_planning,Scoping,and_recon/1.2_Pen_Testing_Process/21webm.mp4 23MB
  192. Section4-Post-Exploitation_and_Merciless_Pivoting/4.5_Password_Attacks/SANS OnDemand_33_2.mp4 23MB
  193. Section1-Comprehensive_pen_test_planning,Scoping,and_recon/1.1_Pen_Testing_foundations/14.mp4 22MB
  194. Section5-In-Depth_Password_Attack_and_Web_App/5.3_Pass_The_Hash_Attacks/SANS OnDemand_33_2.mp4 22MB
  195. Section4-Post-Exploitation_and_Merciless_Pivoting/4.2_Windows_Command_Line_Kung_Fu_for_Penetration_Testing/SANS OnDemand_32.mp4 22MB
  196. Section2-In-Depth_Scanning/2.2_Profiling_the_Target/15.mp4 22MB
  197. Section1-Comprehensive_pen_test_planning,Scoping,and_recon/1.2_Pen_Testing_Process/37.mp4 22MB
  198. Section2-In-Depth_Scanning/2.1_Scanning_for_Targets/12.mp4 22MB
  199. Section4-Post-Exploitation_and_Merciless_Pivoting/4.3_Remotely_Run_Windows_Commands/SANS OnDemand_28_2.mp4 22MB
  200. Section4-Post-Exploitation_and_Merciless_Pivoting/4.4_Powershell_Kung_Fu_For_Penetration_Testers/SANS OnDemand_34.mp4 22MB
  201. Section4-Post-Exploitation_and_Merciless_Pivoting/4.4_Powershell_Kung_Fu_For_Penetration_Testers/SANS OnDemand_55.mp4 22MB
  202. SelfStudy/SEC560_1D_C01.mp3 22MB
  203. Section2-In-Depth_Scanning/2.2_Profiling_the_Target/18.mp4 22MB
  204. Section1-Comprehensive_pen_test_planning,Scoping,and_recon/1.1_Pen_Testing_foundations/59.mp4 22MB
  205. Section4-Post-Exploitation_and_Merciless_Pivoting/4.4_Powershell_Kung_Fu_For_Penetration_Testers/SANS OnDemand_56.mp4 22MB
  206. Section5-In-Depth_Password_Attack_and_Web_App/5.5_Injection_Attacks/a (60).mp4 22MB
  207. Section4-Post-Exploitation_and_Merciless_Pivoting/4.1_Moving_Files_with_Exploits/SANS OnDemand_34_2.mp4 22MB
  208. Section5-In-Depth_Password_Attack_and_Web_App/5.5_Injection_Attacks/a (79).mp4 22MB
  209. Section3-Exploitation/3.4_Metasploit_Database_and_Tool_Integration/SANS OnDemand_5.mp4 21MB
  210. Section2-In-Depth_Scanning/2.1_Scanning_for_Targets/67.mp4 21MB
  211. Section5-In-Depth_Password_Attack_and_Web_App/5.2_Advanced_Password_Attacks/SANS OnDemand_1 (5).mp4 21MB
  212. Section2-In-Depth_Scanning/2.2_Profiling_the_Target/27.mp4 21MB
  213. Section2-In-Depth_Scanning/2.2_Profiling_the_Target/14.mp4 21MB
  214. Section4-Post-Exploitation_and_Merciless_Pivoting/4.5_Password_Attacks/SANS OnDemand_27_2.mp4 21MB
  215. SelfStudy/SEC560_1A_C01.mp3 21MB
  216. Section5-In-Depth_Password_Attack_and_Web_App/5.5_Injection_Attacks/a (3).mp4 21MB
  217. Section4-Post-Exploitation_and_Merciless_Pivoting/4.1_Moving_Files_with_Exploits/SANS OnDemand_37_2.mp4 21MB
  218. Section2-In-Depth_Scanning/2.1_Scanning_for_Targets/8.mp4 21MB
  219. Section3-Exploitation/3.2_Metasploit/12.mp4 20MB
  220. Section6-Peneteration_Test_and_Capture_the_Flag_Workshop/6.1_Penteration_Testing_Workshop/SANS OnDemand_39_2.mp4 20MB
  221. Section2-In-Depth_Scanning/2.1_Scanning_for_Targets/31.mp4 20MB
  222. Section1-Comprehensive_pen_test_planning,Scoping,and_recon/1.3_Reconnaissance/31.mp4 20MB
  223. Section1-Comprehensive_pen_test_planning,Scoping,and_recon/1.1_Pen_Testing_foundations/48.mp4 20MB
  224. Section1-Comprehensive_pen_test_planning,Scoping,and_recon/1.3_Reconnaissance/71.mp4 20MB
  225. Section3-Exploitation/3.1_Exploitation_Fundamentals/17.mp4 20MB
  226. Section4-Post-Exploitation_and_Merciless_Pivoting/4.4_Powershell_Kung_Fu_For_Penetration_Testers/SANS OnDemand_33.mp4 20MB
  227. Section1-Comprehensive_pen_test_planning,Scoping,and_recon/1.3_Reconnaissance/29webm 20MB
  228. Section4-Post-Exploitation_and_Merciless_Pivoting/4.7_Advanced_Hash_Manipulation/SANS OnDemand_39.mp4 20MB
  229. Section4-Post-Exploitation_and_Merciless_Pivoting/4.5_Password_Attacks/SANS OnDemand_43_2.mp4 20MB
  230. Section1-Comprehensive_pen_test_planning,Scoping,and_recon/1.3_Reconnaissance/40.mp4 20MB
  231. Section1-Comprehensive_pen_test_planning,Scoping,and_recon/1.2_Pen_Testing_Process/10.mp4 20MB
  232. Section4-Post-Exploitation_and_Merciless_Pivoting/4.4_Powershell_Kung_Fu_For_Penetration_Testers/SANS OnDemand_50.mp4 20MB
  233. Section2-In-Depth_Scanning/2.2_Profiling_the_Target/16.mp4 20MB
  234. Section3-Exploitation/3.6_Post_Exploitation_with_Empire/SANS OnDemand_32.mp4 19MB
  235. Section5-In-Depth_Password_Attack_and_Web_App/5.5_Injection_Attacks/a (78).mp4 19MB
  236. Section4-Post-Exploitation_and_Merciless_Pivoting/4.4_Powershell_Kung_Fu_For_Penetration_Testers/SANS OnDemand_29.mp4 19MB
  237. Section4-Post-Exploitation_and_Merciless_Pivoting/4.2_Windows_Command_Line_Kung_Fu_for_Penetration_Testing/SANS OnDemand_46.mp4 19MB
  238. Section5-In-Depth_Password_Attack_and_Web_App/5.5_Injection_Attacks/a (63).mp4 19MB
  239. Section4-Post-Exploitation_and_Merciless_Pivoting/4.4_Powershell_Kung_Fu_For_Penetration_Testers/SANS OnDemand_38.mp4 19MB
  240. Section4-Post-Exploitation_and_Merciless_Pivoting/4.2_Windows_Command_Line_Kung_Fu_for_Penetration_Testing/SANS OnDemand_44.mp4 19MB
  241. Section5-In-Depth_Password_Attack_and_Web_App/5.5_Injection_Attacks/a (83).mp4 19MB
  242. Section4-Post-Exploitation_and_Merciless_Pivoting/4.2_Windows_Command_Line_Kung_Fu_for_Penetration_Testing/SANS OnDemand_29.mp4 19MB
  243. Section5-In-Depth_Password_Attack_and_Web_App/5.2_Advanced_Password_Attacks/SANS OnDemand_1 (44).mp4 19MB
  244. Section4-Post-Exploitation_and_Merciless_Pivoting/4.1_Moving_Files_with_Exploits/SANS OnDemand_32_2.mp4 19MB
  245. Section2-In-Depth_Scanning/2.1_Scanning_for_Targets/52.mp4 19MB
  246. Section1-Comprehensive_pen_test_planning,Scoping,and_recon/1.1_Pen_Testing_foundations/53.mp4 19MB
  247. Section2-In-Depth_Scanning/2.1_Scanning_for_Targets/2.mp4 19MB
  248. Section3-Exploitation/3.2_Metasploit/46.mp4 19MB
  249. Section3-Exploitation/3.3_AV_Evasion_with_Veil-Evision/2.mp4 19MB
  250. Section3-Exploitation/3.2_Metasploit/2.mp4 18MB
  251. Section1-Comprehensive_pen_test_planning,Scoping,and_recon/1.1_Pen_Testing_foundations/33.mp4 18MB
  252. Section2-In-Depth_Scanning/2.3_vulnerability_Scanning/18.mp4 18MB
  253. Section3-Exploitation/3.3_AV_Evasion_with_Veil-Evision/6.mp4 18MB
  254. Section3-Exploitation/3.5_Port_Pivot_Relay/SANS OnDemand_35.mp4 18MB
  255. Section4-Post-Exploitation_and_Merciless_Pivoting/4.6_Password_Representation_Formats/SANS OnDemand_36.mp4 18MB
  256. Section5-In-Depth_Password_Attack_and_Web_App/5.2_Advanced_Password_Attacks/SANS OnDemand_1 (24).mp4 18MB
  257. Section5-In-Depth_Password_Attack_and_Web_App/5.5_Injection_Attacks/a (18).mp4 18MB
  258. Section1-Comprehensive_pen_test_planning,Scoping,and_recon/1.2_Pen_Testing_Process/7.mp4 18MB
  259. Section1-Comprehensive_pen_test_planning,Scoping,and_recon/1.1_Pen_Testing_foundations/11.mp4 18MB
  260. Section3-Exploitation/3.5_Port_Pivot_Relay/SANS OnDemand_28.mp4 18MB
  261. Section3-Exploitation/3.3_AV_Evasion_with_Veil-Evision/5.mp4 18MB
  262. Section4-Post-Exploitation_and_Merciless_Pivoting/4.5_Password_Attacks/SANS OnDemand_44_2.mp4 18MB
  263. Section4-Post-Exploitation_and_Merciless_Pivoting/4.4_Powershell_Kung_Fu_For_Penetration_Testers/SANS OnDemand_32.mp4 18MB
  264. Section1-Comprehensive_pen_test_planning,Scoping,and_recon/1.2_Pen_Testing_Process/40.mp4 18MB
  265. Section3-Exploitation/3.2_Metasploit/11.mp4 18MB
  266. Section1-Comprehensive_pen_test_planning,Scoping,and_recon/1.1_Pen_Testing_foundations/37.mp4 18MB
  267. Section2-In-Depth_Scanning/2.3_vulnerability_Scanning/2.mp4 18MB
  268. Section1-Comprehensive_pen_test_planning,Scoping,and_recon/1.1_Pen_Testing_foundations/18.mp4 18MB
  269. Section1-Comprehensive_pen_test_planning,Scoping,and_recon/1.3_Reconnaissance/55.mp4 18MB
  270. Section3-Exploitation/3.3_AV_Evasion_with_Veil-Evision/10.mp4 17MB
  271. Section4-Post-Exploitation_and_Merciless_Pivoting/4.6_Password_Representation_Formats/SANS OnDemand_35.mp4 17MB
  272. Section3-Exploitation/3.6_Post_Exploitation_with_Empire/SANS OnDemand_28.mp4 17MB
  273. Section2-In-Depth_Scanning/2.5_Netcat_for_the_Pentester/3.mp4 17MB
  274. Section5-In-Depth_Password_Attack_and_Web_App/5.5_Injection_Attacks/a (22).mp4 17MB
  275. Section4-Post-Exploitation_and_Merciless_Pivoting/4.7_Advanced_Hash_Manipulation/SANS OnDemand_40.mp4 17MB
  276. Section4-Post-Exploitation_and_Merciless_Pivoting/4.5_Password_Attacks/SANS OnDemand_32_2.mp4 17MB
  277. Section1-Comprehensive_pen_test_planning,Scoping,and_recon/1.2_Pen_Testing_Process/11.mp4 17MB
  278. Section5-In-Depth_Password_Attack_and_Web_App/5.2_Advanced_Password_Attacks/SANS OnDemand_1 (25).mp4 17MB
  279. Section5-In-Depth_Password_Attack_and_Web_App/5.5_Injection_Attacks/a (81).mp4 17MB
  280. SelfStudy/SEC560_1C_C01.mp3 17MB
  281. Section1-Comprehensive_pen_test_planning,Scoping,and_recon/1.2_Pen_Testing_Process/44.mp4 17MB
  282. Section5-In-Depth_Password_Attack_and_Web_App/5.2_Advanced_Password_Attacks/SANS OnDemand_1 (7).mp4 17MB
  283. Section1-Comprehensive_pen_test_planning,Scoping,and_recon/1.1_Pen_Testing_foundations/56.mp4 17MB
  284. Section4-Post-Exploitation_and_Merciless_Pivoting/4.7_Advanced_Hash_Manipulation/SANS OnDemand_29_2.mp4 17MB
  285. Section1-Comprehensive_pen_test_planning,Scoping,and_recon/1.2_Pen_Testing_Process/35.mp4 17MB
  286. Section5-In-Depth_Password_Attack_and_Web_App/5.3_Pass_The_Hash_Attacks/SANS OnDemand_30_2.mp4 17MB
  287. Section4-Post-Exploitation_and_Merciless_Pivoting/4.2_Windows_Command_Line_Kung_Fu_for_Penetration_Testing/SANS OnDemand_41.mp4 17MB
  288. Section4-Post-Exploitation_and_Merciless_Pivoting/4.2_Windows_Command_Line_Kung_Fu_for_Penetration_Testing/SANS OnDemand_37.mp4 17MB
  289. Section1-Comprehensive_pen_test_planning,Scoping,and_recon/1.2_Pen_Testing_Process/38.mp4 16MB
  290. Section2-In-Depth_Scanning/2.2_Profiling_the_Target/29.mp4 16MB
  291. Section2-In-Depth_Scanning/2.2_Profiling_the_Target/12.mp4 16MB
  292. Section2-In-Depth_Scanning/2.4_Enumerating_Users/2.mp4 16MB
  293. Section2-In-Depth_Scanning/2.2_Profiling_the_Target/4.mp4 16MB
  294. Section1-Comprehensive_pen_test_planning,Scoping,and_recon/1.1_Pen_Testing_foundations/32.mp4 16MB
  295. Section1-Comprehensive_pen_test_planning,Scoping,and_recon/1.2_Pen_Testing_Process/50.mp4 16MB
  296. Section4-Post-Exploitation_and_Merciless_Pivoting/4.4_Powershell_Kung_Fu_For_Penetration_Testers/SANS OnDemand_28.mp4 16MB
  297. Section1-Comprehensive_pen_test_planning,Scoping,and_recon/1.1_Pen_Testing_foundations/7.mp4 16MB
  298. Section4-Post-Exploitation_and_Merciless_Pivoting/4.3_Remotely_Run_Windows_Commands/SANS OnDemand_31_2.mp4 16MB
  299. Section4-Post-Exploitation_and_Merciless_Pivoting/4.5_Password_Attacks/SANS OnDemand_42_2.mp4 16MB
  300. Section2-In-Depth_Scanning/2.5_Netcat_for_the_Pentester/17.mp4 16MB
  301. Section5-In-Depth_Password_Attack_and_Web_App/5.5_Injection_Attacks/a (6).mp4 16MB
  302. Section3-Exploitation/3.6_Post_Exploitation_with_Empire/SANS OnDemand_41.mp4 16MB
  303. Section2-In-Depth_Scanning/2.1_Scanning_for_Targets/18.mp4 16MB
  304. Section4-Post-Exploitation_and_Merciless_Pivoting/4.3_Remotely_Run_Windows_Commands/SANS OnDemand_34_2.mp4 16MB
  305. SelfStudy/SEC560_1B_C01.mp3 16MB
  306. Section2-In-Depth_Scanning/2.1_Scanning_for_Targets/21.mp4 16MB
  307. Section4-Post-Exploitation_and_Merciless_Pivoting/4.2_Windows_Command_Line_Kung_Fu_for_Penetration_Testing/SANS OnDemand_36.mp4 16MB
  308. Section5-In-Depth_Password_Attack_and_Web_App/5.5_Injection_Attacks/a (58).mp4 16MB
  309. Section3-Exploitation/3.4_Metasploit_Database_and_Tool_Integration/SANS OnDemand_3.mp4 16MB
  310. Section5-In-Depth_Password_Attack_and_Web_App/5.2_Advanced_Password_Attacks/SANS OnDemand_1 (50).mp4 15MB
  311. Section1-Comprehensive_pen_test_planning,Scoping,and_recon/1.1_Pen_Testing_foundations/10.mp4 15MB
  312. Section2-In-Depth_Scanning/2.1_Scanning_for_Targets/57.mp4 15MB
  313. Section4-Post-Exploitation_and_Merciless_Pivoting/4.4_Powershell_Kung_Fu_For_Penetration_Testers/SANS OnDemand_41.mp4 15MB
  314. Section1-Comprehensive_pen_test_planning,Scoping,and_recon/1.2_Pen_Testing_Process/46.mp4 15MB
  315. Section1-Comprehensive_pen_test_planning,Scoping,and_recon/1.2_Pen_Testing_Process/13.mp4 15MB
  316. Section4-Post-Exploitation_and_Merciless_Pivoting/4.2_Windows_Command_Line_Kung_Fu_for_Penetration_Testing/SANS OnDemand_52.mp4 15MB
  317. Section4-Post-Exploitation_and_Merciless_Pivoting/4.6_Password_Representation_Formats/SANS OnDemand_33.mp4 15MB
  318. Section1-Comprehensive_pen_test_planning,Scoping,and_recon/1.3_Reconnaissance/46.mp4 15MB
  319. Section2-In-Depth_Scanning/2.3_vulnerability_Scanning/10.mp4 15MB
  320. Section4-Post-Exploitation_and_Merciless_Pivoting/4.3_Remotely_Run_Windows_Commands/SANS OnDemand_30_2.mp4 15MB
  321. Section4-Post-Exploitation_and_Merciless_Pivoting/4.2_Windows_Command_Line_Kung_Fu_for_Penetration_Testing/SANS OnDemand_45.mp4 15MB
  322. Section4-Post-Exploitation_and_Merciless_Pivoting/4.4_Powershell_Kung_Fu_For_Penetration_Testers/SANS OnDemand_43.mp4 15MB
  323. Section4-Post-Exploitation_and_Merciless_Pivoting/4.4_Powershell_Kung_Fu_For_Penetration_Testers/SANS OnDemand_44.mp4 15MB
  324. Section3-Exploitation/3.2_Metasploit/20.mp4 15MB
  325. Section1-Comprehensive_pen_test_planning,Scoping,and_recon/1.3_Reconnaissance/2.mp4 15MB
  326. Section3-Exploitation/3.2_Metasploit/47.mp4 15MB
  327. Section2-In-Depth_Scanning/2.1_Scanning_for_Targets/35.mp4 15MB
  328. Section1-Comprehensive_pen_test_planning,Scoping,and_recon/1.3_Reconnaissance/35.mp4 15MB
  329. Section2-In-Depth_Scanning/2.2_Profiling_the_Target/31.mp4 15MB
  330. Section2-In-Depth_Scanning/2.2_Profiling_the_Target/19.mp4 15MB
  331. Section4-Post-Exploitation_and_Merciless_Pivoting/4.5_Password_Attacks/SANS OnDemand_54_2.mp4 15MB
  332. Section5-In-Depth_Password_Attack_and_Web_App/5.4_Web_Vulnerability_Scanning_and_Web_Proxies/SANS OnDemand_27.mp4 15MB
  333. Section4-Post-Exploitation_and_Merciless_Pivoting/4.4_Powershell_Kung_Fu_For_Penetration_Testers/SANS OnDemand_57.mp4 14MB
  334. Section5-In-Depth_Password_Attack_and_Web_App/5.5_Injection_Attacks/a (8).mp4 14MB
  335. Section2-In-Depth_Scanning/2.3_vulnerability_Scanning/14.mp4 14MB
  336. Section2-In-Depth_Scanning/2.3_vulnerability_Scanning/19.mp4 14MB
  337. Section2-In-Depth_Scanning/2.2_Profiling_the_Target/28.mp4 14MB
  338. Section2-In-Depth_Scanning/2.2_Profiling_the_Target/34.mp4 14MB
  339. Section5-In-Depth_Password_Attack_and_Web_App/5.5_Injection_Attacks/a (2).mp4 14MB
  340. Section5-In-Depth_Password_Attack_and_Web_App/5.5_Injection_Attacks/a (17).mp4 14MB
  341. Section3-Exploitation/3.1_Exploitation_Fundamentals/9.mp4 14MB
  342. Section4-Post-Exploitation_and_Merciless_Pivoting/4.3_Remotely_Run_Windows_Commands/SANS OnDemand_29_2.mp4 14MB
  343. Section2-In-Depth_Scanning/2.3_vulnerability_Scanning/17.mp4 14MB
  344. Section1-Comprehensive_pen_test_planning,Scoping,and_recon/1.3_Reconnaissance/12.mp4 14MB
  345. Section4-Post-Exploitation_and_Merciless_Pivoting/4.3_Remotely_Run_Windows_Commands/SANS OnDemand_48_2.mp4 14MB
  346. Section1-Comprehensive_pen_test_planning,Scoping,and_recon/1.1_Pen_Testing_foundations/27.mp4 14MB
  347. Section6-Peneteration_Test_and_Capture_the_Flag_Workshop/6.1_Penteration_Testing_Workshop/SANS OnDemand_43_2.mp4 14MB
  348. Section2-In-Depth_Scanning/2.3_vulnerability_Scanning/8.mp4 14MB
  349. Section2-In-Depth_Scanning/2.2_Profiling_the_Target/37.mp4 14MB
  350. Section1-Comprehensive_pen_test_planning,Scoping,and_recon/1.2_Pen_Testing_Process/33.mp4 14MB
  351. Section6-Peneteration_Test_and_Capture_the_Flag_Workshop/6.1_Penteration_Testing_Workshop/SANS OnDemand_37_2.mp4 14MB
  352. Section2-In-Depth_Scanning/2.1_Scanning_for_Targets/6.mp4 14MB
  353. Section3-Exploitation/3.2_Metasploit/18.mp4 14MB
  354. Section5-In-Depth_Password_Attack_and_Web_App/5.5_Injection_Attacks/a (70).mp4 14MB
  355. Section1-Comprehensive_pen_test_planning,Scoping,and_recon/1.1_Pen_Testing_foundations/29.mp4 14MB
  356. Section4-Post-Exploitation_and_Merciless_Pivoting/4.5_Password_Attacks/SANS OnDemand_41_2.mp4 14MB
  357. Section2-In-Depth_Scanning/2.2_Profiling_the_Target/2.mp4 14MB
  358. Section1-Comprehensive_pen_test_planning,Scoping,and_recon/1.1_Pen_Testing_foundations/26.mp4 14MB
  359. Section4-Post-Exploitation_and_Merciless_Pivoting/4.4_Powershell_Kung_Fu_For_Penetration_Testers/SANS OnDemand_26.mp4 13MB
  360. Section2-In-Depth_Scanning/2.1_Scanning_for_Targets/42.mp4 13MB
  361. Section5-In-Depth_Password_Attack_and_Web_App/5.5_Injection_Attacks/a (56).mp4 13MB
  362. Section1-Comprehensive_pen_test_planning,Scoping,and_recon/1.2_Pen_Testing_Process/32.mp4 13MB
  363. Section5-In-Depth_Password_Attack_and_Web_App/5.2_Advanced_Password_Attacks/SANS OnDemand_1 (23).mp4 13MB
  364. Section2-In-Depth_Scanning/2.3_vulnerability_Scanning/6.mp4 13MB
  365. Section4-Post-Exploitation_and_Merciless_Pivoting/4.7_Advanced_Hash_Manipulation/SANS OnDemand_47.mp4 13MB
  366. Section1-Comprehensive_pen_test_planning,Scoping,and_recon/1.3_Reconnaissance/6.mp4 13MB
  367. Section2-In-Depth_Scanning/2.4_Enumerating_Users/6.mp4 13MB
  368. Section2-In-Depth_Scanning/2.5_Netcat_for_the_Pentester/2.mp4 13MB
  369. Section4-Post-Exploitation_and_Merciless_Pivoting/4.2_Windows_Command_Line_Kung_Fu_for_Penetration_Testing/SANS OnDemand_56.mp4 13MB
  370. Section1-Comprehensive_pen_test_planning,Scoping,and_recon/1.2_Pen_Testing_Process/49.mp4 13MB
  371. Section2-In-Depth_Scanning/2.5_Netcat_for_the_Pentester/6.mp4 13MB
  372. Section4-Post-Exploitation_and_Merciless_Pivoting/4.1_Moving_Files_with_Exploits/SANS OnDemand_36_2.mp4 12MB
  373. Section4-Post-Exploitation_and_Merciless_Pivoting/4.2_Windows_Command_Line_Kung_Fu_for_Penetration_Testing/SANS OnDemand_39.mp4 12MB
  374. Section2-In-Depth_Scanning/2.5_Netcat_for_the_Pentester/5.mp4 12MB
  375. Section5-In-Depth_Password_Attack_and_Web_App/5.2_Advanced_Password_Attacks/SANS OnDemand_1 (15).mp4 12MB
  376. Section2-In-Depth_Scanning/2.4_Enumerating_Users/4.mp4 12MB
  377. Section4-Post-Exploitation_and_Merciless_Pivoting/4.4_Powershell_Kung_Fu_For_Penetration_Testers/SANS OnDemand_47.mp4 12MB
  378. Section2-In-Depth_Scanning/2.1_Scanning_for_Targets/25.mp4 12MB
  379. Section1-Comprehensive_pen_test_planning,Scoping,and_recon/1.3_Reconnaissance/25.mp4 12MB
  380. Section6-Peneteration_Test_and_Capture_the_Flag_Workshop/6.1_Penteration_Testing_Workshop/SANS OnDemand_40_2.mp4 12MB
  381. Section5-In-Depth_Password_Attack_and_Web_App/5.4_Web_Vulnerability_Scanning_and_Web_Proxies/SANS OnDemand_41.mp4 12MB
  382. Section4-Post-Exploitation_and_Merciless_Pivoting/4.6_Password_Representation_Formats/SANS OnDemand_37.mp4 12MB
  383. Section4-Post-Exploitation_and_Merciless_Pivoting/4.5_Password_Attacks/SANS OnDemand_30_2.mp4 12MB
  384. Section1-Comprehensive_pen_test_planning,Scoping,and_recon/1.3_Reconnaissance/54.mp4 12MB
  385. Section2-In-Depth_Scanning/2.1_Scanning_for_Targets/49.mp4 12MB
  386. Section5-In-Depth_Password_Attack_and_Web_App/5.5_Injection_Attacks/a (62).mp4 12MB
  387. Section1-Comprehensive_pen_test_planning,Scoping,and_recon/1.2_Pen_Testing_Process/22.mp4 12MB
  388. Section2-In-Depth_Scanning/2.1_Scanning_for_Targets/32.mp4 12MB
  389. Section1-Comprehensive_pen_test_planning,Scoping,and_recon/1.3_Reconnaissance/32.mp4 12MB
  390. Section4-Post-Exploitation_and_Merciless_Pivoting/4.6_Password_Representation_Formats/SANS OnDemand_28.mp4 12MB
  391. Section3-Exploitation/3.5_Port_Pivot_Relay/SANS OnDemand_27.mp4 12MB
  392. Section2-In-Depth_Scanning/2.2_Profiling_the_Target/24.mp4 12MB
  393. Section2-In-Depth_Scanning/2.3_vulnerability_Scanning/3.mp4 11MB
  394. Section3-Exploitation/3.4_Metasploit_Database_and_Tool_Integration/SANS OnDemand_2.mp4 11MB
  395. Section4-Post-Exploitation_and_Merciless_Pivoting/4.2_Windows_Command_Line_Kung_Fu_for_Penetration_Testing/SANS OnDemand_35.mp4 11MB
  396. Section2-In-Depth_Scanning/2.1_Scanning_for_Targets/23.mp4 11MB
  397. Section1-Comprehensive_pen_test_planning,Scoping,and_recon/1.3_Reconnaissance/47.mp4 11MB
  398. Section1-Comprehensive_pen_test_planning,Scoping,and_recon/1.2_Pen_Testing_Process/41.mp4 11MB
  399. Section2-In-Depth_Scanning/2.1_Scanning_for_Targets/5.mp4 11MB
  400. Section4-Post-Exploitation_and_Merciless_Pivoting/4.2_Windows_Command_Line_Kung_Fu_for_Penetration_Testing/SANS OnDemand_60.mp4 11MB
  401. Section4-Post-Exploitation_and_Merciless_Pivoting/4.2_Windows_Command_Line_Kung_Fu_for_Penetration_Testing/SANS OnDemand_43.mp4 11MB
  402. Section1-Comprehensive_pen_test_planning,Scoping,and_recon/1.1_Pen_Testing_foundations/54.mp4 11MB
  403. Section3-Exploitation/3.2_Metasploit/49.mp4 11MB
  404. Section1-Comprehensive_pen_test_planning,Scoping,and_recon/1.3_Reconnaissance/42.mp4 11MB
  405. Section5-In-Depth_Password_Attack_and_Web_App/5.2_Advanced_Password_Attacks/SANS OnDemand_1 (9).mp4 11MB
  406. Section1-Comprehensive_pen_test_planning,Scoping,and_recon/1.3_Reconnaissance/41.mp4 11MB
  407. Section1-Comprehensive_pen_test_planning,Scoping,and_recon/1.2_Pen_Testing_Process/21webm 11MB
  408. Section1-Comprehensive_pen_test_planning,Scoping,and_recon/1.2_Pen_Testing_Process/2.mp4 11MB
  409. Section4-Post-Exploitation_and_Merciless_Pivoting/4.4_Powershell_Kung_Fu_For_Penetration_Testers/SANS OnDemand_58.mp4 11MB
  410. Section2-In-Depth_Scanning/2.3_vulnerability_Scanning/22.mp4 11MB
  411. Section5-In-Depth_Password_Attack_and_Web_App/5.5_Injection_Attacks/a (85).mp4 11MB
  412. Section3-Exploitation/3.2_Metasploit/16.mp4 11MB
  413. Section5-In-Depth_Password_Attack_and_Web_App/5.2_Advanced_Password_Attacks/SANS OnDemand_1 (42).mp4 11MB
  414. Section3-Exploitation/3.2_Metasploit/1.mp4 11MB
  415. Section3-Exploitation/3.4_Metasploit_Database_and_Tool_Integration/SANS OnDemand_4.mp4 11MB
  416. Section5-In-Depth_Password_Attack_and_Web_App/5.3_Pass_The_Hash_Attacks/SANS OnDemand_27_2.mp4 10MB
  417. Section2-In-Depth_Scanning/2.2_Profiling_the_Target/32.mp4 10MB
  418. Section4-Post-Exploitation_and_Merciless_Pivoting/4.7_Advanced_Hash_Manipulation/SANS OnDemand_28_2.mp4 10MB
  419. Section2-In-Depth_Scanning/2.3_vulnerability_Scanning/15.mp4 10MB
  420. Section2-In-Depth_Scanning/2.1_Scanning_for_Targets/3.mp4 10MB
  421. Section3-Exploitation/3.3_AV_Evasion_with_Veil-Evision/26.mp4 10MB
  422. Section4-Post-Exploitation_and_Merciless_Pivoting/4.7_Advanced_Hash_Manipulation/SANS OnDemand_49.mp4 10MB
  423. Section1-Comprehensive_pen_test_planning,Scoping,and_recon/1.1_Pen_Testing_foundations/57.mp4 10MB
  424. Section4-Post-Exploitation_and_Merciless_Pivoting/4.2_Windows_Command_Line_Kung_Fu_for_Penetration_Testing/SANS OnDemand_30.mp4 10MB
  425. Section3-Exploitation/3.2_Metasploit/50.mp4 10MB
  426. Section5-In-Depth_Password_Attack_and_Web_App/5.5_Injection_Attacks/a (15).mp4 10MB
  427. Section1-Comprehensive_pen_test_planning,Scoping,and_recon/1.3_Reconnaissance/7.mp4 10MB
  428. Section2-In-Depth_Scanning/2.4_Enumerating_Users/10.mp4 10MB
  429. Section2-In-Depth_Scanning/2.2_Profiling_the_Target/21.mp4 10MB
  430. Section4-Post-Exploitation_and_Merciless_Pivoting/4.5_Password_Attacks/SANS OnDemand_45_2.mp4 10MB
  431. Section5-In-Depth_Password_Attack_and_Web_App/5.5_Injection_Attacks/a (23).mp4 10MB
  432. Section5-In-Depth_Password_Attack_and_Web_App/5.2_Advanced_Password_Attacks/SANS OnDemand_1 (33).mp4 10MB
  433. Section3-Exploitation/3.6_Post_Exploitation_with_Empire/SANS OnDemand_36.mp4 10MB
  434. Section2-In-Depth_Scanning/2.4_Enumerating_Users/7.mp4 10MB
  435. Section5-In-Depth_Password_Attack_and_Web_App/5.5_Injection_Attacks/a (14).mp4 10MB
  436. Section4-Post-Exploitation_and_Merciless_Pivoting/4.2_Windows_Command_Line_Kung_Fu_for_Penetration_Testing/SANS OnDemand_50.mp4 10MB
  437. Section5-In-Depth_Password_Attack_and_Web_App/5.2_Advanced_Password_Attacks/SANS OnDemand_1 (29).mp4 10MB
  438. Section2-In-Depth_Scanning/2.2_Profiling_the_Target/38.mp4 10MB
  439. Section4-Post-Exploitation_and_Merciless_Pivoting/4.5_Password_Attacks/SANS OnDemand_35_2.mp4 10MB
  440. Section3-Exploitation/3.2_Metasploit/6.mp4 10MB
  441. Section1-Comprehensive_pen_test_planning,Scoping,and_recon/1.3_Reconnaissance/69.mp4 10MB
  442. Section2-In-Depth_Scanning/2.1_Scanning_for_Targets/19.mp4 10MB
  443. Section4-Post-Exploitation_and_Merciless_Pivoting/4.5_Password_Attacks/SANS OnDemand_50_2.mp4 10MB
  444. Section5-In-Depth_Password_Attack_and_Web_App/5.2_Advanced_Password_Attacks/SANS OnDemand_1 (28).mp4 10MB
  445. Section3-Exploitation/3.2_Metasploit/43.mp4 10MB
  446. Section5-In-Depth_Password_Attack_and_Web_App/5.5_Injection_Attacks/a (80).mp4 9MB
  447. Section6-Peneteration_Test_and_Capture_the_Flag_Workshop/6.1_Penteration_Testing_Workshop/SANS OnDemand_38_2.mp4 9MB
  448. Section3-Exploitation/3.4_Metasploit_Database_and_Tool_Integration/SANS OnDemand_24.mp4 9MB
  449. Section1-Comprehensive_pen_test_planning,Scoping,and_recon/1.1_Pen_Testing_foundations/41.mp4 9MB
  450. Section2-In-Depth_Scanning/2.1_Scanning_for_Targets/30.mp4 9MB
  451. Section1-Comprehensive_pen_test_planning,Scoping,and_recon/1.3_Reconnaissance/30.mp4 9MB
  452. Section2-In-Depth_Scanning/2.1_Scanning_for_Targets/45.mp4 9MB
  453. Section4-Post-Exploitation_and_Merciless_Pivoting/4.2_Windows_Command_Line_Kung_Fu_for_Penetration_Testing/SANS OnDemand_27.mp4 9MB
  454. Section3-Exploitation/3.3_AV_Evasion_with_Veil-Evision/8.mp4 9MB
  455. Section1-Comprehensive_pen_test_planning,Scoping,and_recon/1.3_Reconnaissance/5 9MB
  456. Section4-Post-Exploitation_and_Merciless_Pivoting/4.5_Password_Attacks/SANS OnDemand_36_2.mp4 9MB
  457. Section4-Post-Exploitation_and_Merciless_Pivoting/4.6_Password_Representation_Formats/SANS OnDemand_27.mp4 9MB
  458. Section1-Comprehensive_pen_test_planning,Scoping,and_recon/1.2_Pen_Testing_Process/12.mp4 9MB
  459. Section3-Exploitation/3.2_Metasploit/4.mp4 9MB
  460. Section2-In-Depth_Scanning/2.4_Enumerating_Users/11.mp4 9MB
  461. Section6-Peneteration_Test_and_Capture_the_Flag_Workshop/6.1_Penteration_Testing_Workshop/SANS OnDemand_31_2.mp4 9MB
  462. Section2-In-Depth_Scanning/2.1_Scanning_for_Targets/61.mp4 9MB
  463. Section1-Comprehensive_pen_test_planning,Scoping,and_recon/1.2_Pen_Testing_Process/39.mp4 9MB
  464. Section5-In-Depth_Password_Attack_and_Web_App/5.2_Advanced_Password_Attacks/SANS OnDemand_1 (17).mp4 9MB
  465. Section5-In-Depth_Password_Attack_and_Web_App/5.2_Advanced_Password_Attacks/SANS OnDemand_1 (6).mp4 9MB
  466. Section5-In-Depth_Password_Attack_and_Web_App/5.2_Advanced_Password_Attacks/SANS OnDemand_1 (43).mp4 9MB
  467. Section4-Post-Exploitation_and_Merciless_Pivoting/4.5_Password_Attacks/SANS OnDemand_53_2.mp4 9MB
  468. Section2-In-Depth_Scanning/2.5_Netcat_for_the_Pentester/7.mp4 9MB
  469. Section4-Post-Exploitation_and_Merciless_Pivoting/4.7_Advanced_Hash_Manipulation/SANS OnDemand_44.mp4 9MB
  470. Section1-Comprehensive_pen_test_planning,Scoping,and_recon/1.2_Pen_Testing_Process/25.mp4 9MB
  471. Section3-Exploitation/3.2_Metasploit/26.mp4 9MB
  472. Section3-Exploitation/3.2_Metasploit/58.mp4 9MB
  473. Section1-Comprehensive_pen_test_planning,Scoping,and_recon/1.2_Pen_Testing_Process/31.mp4 9MB
  474. Section4-Post-Exploitation_and_Merciless_Pivoting/4.2_Windows_Command_Line_Kung_Fu_for_Penetration_Testing/SANS OnDemand_54.mp4 9MB
  475. Section4-Post-Exploitation_and_Merciless_Pivoting/4.2_Windows_Command_Line_Kung_Fu_for_Penetration_Testing/SANS OnDemand_47.mp4 9MB
  476. Section4-Post-Exploitation_and_Merciless_Pivoting/4.4_Powershell_Kung_Fu_For_Penetration_Testers/SANS OnDemand_49.mp4 9MB
  477. Section2-In-Depth_Scanning/2.1_Scanning_for_Targets/55.mp4 9MB
  478. Section1-Comprehensive_pen_test_planning,Scoping,and_recon/1.2_Pen_Testing_Process/30.mp4 9MB
  479. Section4-Post-Exploitation_and_Merciless_Pivoting/4.1_Moving_Files_with_Exploits/SANS OnDemand_27_2.mp4 9MB
  480. Section1-Comprehensive_pen_test_planning,Scoping,and_recon/1.3_Reconnaissance/44.mp4 9MB
  481. Section1-Comprehensive_pen_test_planning,Scoping,and_recon/1.3_Reconnaissance/14.mp4 9MB
  482. Section3-Exploitation/3.1_Exploitation_Fundamentals/16.mp4 9MB
  483. Section4-Post-Exploitation_and_Merciless_Pivoting/4.4_Powershell_Kung_Fu_For_Penetration_Testers/SANS OnDemand_45.mp4 9MB
  484. Section4-Post-Exploitation_and_Merciless_Pivoting/4.5_Password_Attacks/SANS OnDemand_34_2.mp4 9MB
  485. Section5-In-Depth_Password_Attack_and_Web_App/5.4_Web_Vulnerability_Scanning_and_Web_Proxies/SANS OnDemand_42.mp4 8MB
  486. Section4-Post-Exploitation_and_Merciless_Pivoting/4.7_Advanced_Hash_Manipulation/SANS OnDemand_53.mp4 8MB
  487. Section4-Post-Exploitation_and_Merciless_Pivoting/4.2_Windows_Command_Line_Kung_Fu_for_Penetration_Testing/SANS OnDemand_59.mp4 8MB
  488. Section4-Post-Exploitation_and_Merciless_Pivoting/4.7_Advanced_Hash_Manipulation/SANS OnDemand_41.mp4 8MB
  489. Section1-Comprehensive_pen_test_planning,Scoping,and_recon/1.3_Reconnaissance/5(1).mp4 8MB
  490. Section1-Comprehensive_pen_test_planning,Scoping,and_recon/1.2_Pen_Testing_Process/47.mp4 8MB
  491. Section1-Comprehensive_pen_test_planning,Scoping,and_recon/1.1_Pen_Testing_foundations/51.mp4 8MB
  492. Section3-Exploitation/3.6_Post_Exploitation_with_Empire/SANS OnDemand_37.mp4 8MB
  493. Section5-In-Depth_Password_Attack_and_Web_App/5.5_Injection_Attacks/a (20).mp4 8MB
  494. Section2-In-Depth_Scanning/2.1_Scanning_for_Targets/1.mp4 8MB
  495. Section2-In-Depth_Scanning/2.3_vulnerability_Scanning/26.mp4 8MB
  496. Section5-In-Depth_Password_Attack_and_Web_App/5.5_Injection_Attacks/a (34).mp4 8MB
  497. Section3-Exploitation/3.6_Post_Exploitation_with_Empire/SANS OnDemand_51.mp4 8MB
  498. Section6-Peneteration_Test_and_Capture_the_Flag_Workshop/6.1_Penteration_Testing_Workshop/SANS OnDemand_36_2.mp4 8MB
  499. Section2-In-Depth_Scanning/2.3_vulnerability_Scanning/9.mp4 8MB
  500. Section2-In-Depth_Scanning/2.3_vulnerability_Scanning/4.mp4 8MB
  501. Section5-In-Depth_Password_Attack_and_Web_App/5.5_Injection_Attacks/a (38).mp4 8MB
  502. Section4-Post-Exploitation_and_Merciless_Pivoting/4.5_Password_Attacks/SANS OnDemand_46_2.mp4 8MB
  503. Section5-In-Depth_Password_Attack_and_Web_App/5.4_Web_Vulnerability_Scanning_and_Web_Proxies/SANS OnDemand_51.mp4 8MB
  504. Section1-Comprehensive_pen_test_planning,Scoping,and_recon/1.2_Pen_Testing_Process/53.mp4 8MB
  505. Section6-Peneteration_Test_and_Capture_the_Flag_Workshop/6.1_Penteration_Testing_Workshop/SANS OnDemand_45_2.mp4 8MB
  506. Section4-Post-Exploitation_and_Merciless_Pivoting/4.5_Password_Attacks/SANS OnDemand_49_2.mp4 8MB
  507. Section5-In-Depth_Password_Attack_and_Web_App/5.4_Web_Vulnerability_Scanning_and_Web_Proxies/SANS OnDemand_36.mp4 8MB
  508. Section3-Exploitation/3.1_Exploitation_Fundamentals/11.mp4 8MB
  509. Section3-Exploitation/3.1_Exploitation_Fundamentals/3.mp4 8MB
  510. Section5-In-Depth_Password_Attack_and_Web_App/5.2_Advanced_Password_Attacks/SANS OnDemand_1 (60).mp4 8MB
  511. Section5-In-Depth_Password_Attack_and_Web_App/5.4_Web_Vulnerability_Scanning_and_Web_Proxies/SANS OnDemand_45.mp4 8MB
  512. Section4-Post-Exploitation_and_Merciless_Pivoting/4.5_Password_Attacks/SANS OnDemand_52_2.mp4 7MB
  513. Section2-In-Depth_Scanning/2.1_Scanning_for_Targets/60.mp4 7MB
  514. Section4-Post-Exploitation_and_Merciless_Pivoting/4.5_Password_Attacks/SANS OnDemand_59.mp4 7MB
  515. Section2-In-Depth_Scanning/2.3_vulnerability_Scanning/45.mp4 7MB
  516. Section5-In-Depth_Password_Attack_and_Web_App/5.5_Injection_Attacks/a (12).mp4 7MB
  517. Section2-In-Depth_Scanning/2.1_Scanning_for_Targets/36.mp4 7MB
  518. Section1-Comprehensive_pen_test_planning,Scoping,and_recon/1.3_Reconnaissance/36.mp4 7MB
  519. Section2-In-Depth_Scanning/2.2_Profiling_the_Target/25.mp4 7MB
  520. Section2-In-Depth_Scanning/2.3_vulnerability_Scanning/25.mp4 7MB
  521. Section5-In-Depth_Password_Attack_and_Web_App/5.1_Overview_of_Password_Attack_and_Web_App_Pen_Tensting/SANS OnDemand_26.mp4 7MB
  522. Section3-Exploitation/3.3_AV_Evasion_with_Veil-Evision/4.mp4 7MB
  523. Section5-In-Depth_Password_Attack_and_Web_App/5.2_Advanced_Password_Attacks/SANS OnDemand_1 (52).mp4 7MB
  524. Section4-Post-Exploitation_and_Merciless_Pivoting/4.7_Advanced_Hash_Manipulation/SANS OnDemand_27_2.mp4 7MB
  525. Section1-Comprehensive_pen_test_planning,Scoping,and_recon/1.1_Pen_Testing_foundations/39.mp4 7MB
  526. Section1-Comprehensive_pen_test_planning,Scoping,and_recon/1.3_Reconnaissance/67.mp4 7MB
  527. Section4-Post-Exploitation_and_Merciless_Pivoting/4.3_Remotely_Run_Windows_Commands/SANS OnDemand_43_2.mp4 7MB
  528. Section4-Post-Exploitation_and_Merciless_Pivoting/4.5_Password_Attacks/SANS OnDemand_38_2.mp4 7MB
  529. Section1-Comprehensive_pen_test_planning,Scoping,and_recon/1.1_Pen_Testing_foundations/2.mp4 7MB
  530. Section4-Post-Exploitation_and_Merciless_Pivoting/4.6_Password_Representation_Formats/SANS OnDemand_34.mp4 7MB
  531. Section1-Comprehensive_pen_test_planning,Scoping,and_recon/1.2_Pen_Testing_Process/52.mp4 7MB
  532. Section2-In-Depth_Scanning/2.3_vulnerability_Scanning/13.mp4 7MB
  533. Section1-Comprehensive_pen_test_planning,Scoping,and_recon/1.1_Pen_Testing_foundations/24.mp4 7MB
  534. Section5-In-Depth_Password_Attack_and_Web_App/5.4_Web_Vulnerability_Scanning_and_Web_Proxies/SANS OnDemand_37_2.mp4 7MB
  535. Section5-In-Depth_Password_Attack_and_Web_App/5.4_Web_Vulnerability_Scanning_and_Web_Proxies/SANS OnDemand_49.mp4 7MB
  536. Section4-Post-Exploitation_and_Merciless_Pivoting/4.6_Password_Representation_Formats/SANS OnDemand_30.mp4 7MB
  537. Section2-In-Depth_Scanning/2.1_Scanning_for_Targets/43.mp4 7MB
  538. Section5-In-Depth_Password_Attack_and_Web_App/5.5_Injection_Attacks/a (41).mp4 7MB
  539. Section5-In-Depth_Password_Attack_and_Web_App/5.2_Advanced_Password_Attacks/SANS OnDemand_1 (18).mp4 7MB
  540. Section6-Peneteration_Test_and_Capture_the_Flag_Workshop/6.1_Penteration_Testing_Workshop/SANS OnDemand_30_2.mp4 7MB
  541. Section2-In-Depth_Scanning/2.3_vulnerability_Scanning/16.mp4 7MB
  542. Section1-Comprehensive_pen_test_planning,Scoping,and_recon/1.2_Pen_Testing_Process/45.mp4 7MB
  543. Section1-Comprehensive_pen_test_planning,Scoping,and_recon/1.3_Reconnaissance/49.mp4 7MB
  544. Section2-In-Depth_Scanning/2.3_vulnerability_Scanning/5.mp4 7MB
  545. Section2-In-Depth_Scanning/2.4_Enumerating_Users/5.mp4 7MB
  546. Section3-Exploitation/3.2_Metasploit/45.mp4 7MB
  547. Section4-Post-Exploitation_and_Merciless_Pivoting/4.4_Powershell_Kung_Fu_For_Penetration_Testers/SANS OnDemand_48.mp4 7MB
  548. Section1-Comprehensive_pen_test_planning,Scoping,and_recon/1.1_Pen_Testing_foundations/31.mp4 7MB
  549. Section3-Exploitation/3.4_Metasploit_Database_and_Tool_Integration/SANS OnDemand_6.mp4 7MB
  550. Section2-In-Depth_Scanning/2.5_Netcat_for_the_Pentester/4.mp4 7MB
  551. Section2-In-Depth_Scanning/2.2_Profiling_the_Target/23.mp4 7MB
  552. Section3-Exploitation/3.2_Metasploit/68.mp4 7MB
  553. Section5-In-Depth_Password_Attack_and_Web_App/5.4_Web_Vulnerability_Scanning_and_Web_Proxies/SANS OnDemand_30.mp4 7MB
  554. Section5-In-Depth_Password_Attack_and_Web_App/5.2_Advanced_Password_Attacks/SANS OnDemand_1 (8).mp4 6MB
  555. Section5-In-Depth_Password_Attack_and_Web_App/5.2_Advanced_Password_Attacks/SANS OnDemand_1 (31).mp4 6MB
  556. Section5-In-Depth_Password_Attack_and_Web_App/5.5_Injection_Attacks/a (13).mp4 6MB
  557. Section5-In-Depth_Password_Attack_and_Web_App/5.5_Injection_Attacks/a (88).mp4 6B