[] PacktPub - Offensive Hacking Unfolded - Become a Pro Pentester in 2023! 收录时间:2023-09-14 22:53:21 文件大小:5GB 下载次数:1 最近下载:2023-09-14 22:53:21 磁力链接: magnet:?xt=urn:btih:29b798e829475d01f0f528eb4ff8fe59a798aec4 立即下载 复制链接 文件列表 5. Exploitation/1. LAB 1 - Exploitation with Metasploit Framework.mp4 259MB 6. Web Penetration Test/3. CMS Hacking - General Brute Forcing & Exploitation.mp4 238MB 4. Vulnerability Analysis/2. Manually Identify, Analyze and Rank Vulnerabilities.mp4 235MB 5. Exploitation/2. LAB 2 - Exploitation using Manual Public Exploits.mp4 225MB 8. Security Controls Evasion/4. #2 Bypass Antivirus - The Actual Evasion Technique!.mp4 221MB 7. Network PenTesting/3. The Core of Network Testing - Part 2.mp4 213MB 6. Web Penetration Test/6. Important Specific Vulnerabilities such as SQL Injection in-depth.mp4 195MB 2. Fundamentals/4. Theoretical Basics [EXTREMELY IMPORTANT].mp4 184MB 6. Web Penetration Test/4. Do you know the Power of Version Numbers - Part 1.mp4 180MB 7. Network PenTesting/11. Privilege Escalation Techniques - Part 4.mp4 167MB 7. Network PenTesting/8. Privilege Escalation Techniques - Part 1.mp4 158MB 4. Vulnerability Analysis/3. Automated Vulnerability Assessment using Nessus.mp4 157MB 6. Web Penetration Test/7. Important Specific Vulnerabilities such as XSS in-depth.mp4 145MB 7. Network PenTesting/9. Privilege Escalation Techniques - Part 2.mp4 143MB 9. Writing Great Reports/1. Clean Documentation in a Professional Test.mp4 141MB 3. Information Gathering/2. Passive Reconnaissance - Part 2.mp4 137MB 3. Information Gathering/3. Passive Reconnaissance - Part 3.mp4 129MB 7. Network PenTesting/2. The Core of Network Testing - Part 1.mp4 129MB 6. Web Penetration Test/5. Do you know the Power of Version Numbers - Part 2.mp4 125MB 6. Web Penetration Test/8. Important Specific Vulnerabilities such as File Upload & Command Injection.mp4 124MB 6. Web Penetration Test/9. Part 1 Web Server Hacking Intro & Enumeration Ideas.mp4 124MB 6. Web Penetration Test/10. Part 2 Web Server Hacking Risky PUT & DELETE Methods.mp4 120MB 3. Information Gathering/6. Active Reconnaissance - Part 2.mp4 119MB 7. Network PenTesting/5. Post Exploitation using Metasploit - Part 1.mp4 114MB 3. Information Gathering/1. Passive Reconnaissance - Part 1.mp4 114MB 6. Web Penetration Test/1. CMS Hacking - Initial Information Gathering.mp4 112MB 6. Web Penetration Test/2. CMS Hacking - Directory Busting and CMS Scanning.mp4 111MB 2. Fundamentals/1. Lab Setup using the VMware Player.mp4 111MB 7. Network PenTesting/4. The Core of Network Testing - Part 3.mp4 101MB 3. Information Gathering/5. Active Reconnaissance - Part 1.mp4 87MB 7. Network PenTesting/6. Post Exploitation using Metasploit - Part 2.mp4 81MB 7. Network PenTesting/7. Post Exploitation using Metasploit - Part 3.mp4 79MB 3. Information Gathering/7. Active Reconnaissance - Part 3.mp4 76MB 8. Security Controls Evasion/3. #1 Bypass Antivirus - Making the Base Payload.mp4 65MB 4. Vulnerability Analysis/4. Automated Vulnerability Assessment - Nmap & VEGA.mp4 60MB 6. Web Penetration Test/11. Part 3 Web Server Hacking SSH Brute Forcing w Hydra.mp4 58MB 7. Network PenTesting/10. Privilege Escalation Techniques - Part 3.mp4 55MB 1. Opening Lectures/1. Introduction to the Course - Do Not Skip.mp4 44MB 1. Opening Lectures/4. What can you do to get the most out of this course.mp4 36MB 1. Opening Lectures/5. How to get answers to your questions and help with problems.mp4 36MB 10. Happy Ending Lectures/2. Unlock your certificate and upgrade your LinkedIn profile using this course!.mp4 16MB 10. Happy Ending Lectures/4. Thank you very much for completing this course!.mp4 5MB 9. Writing Great Reports/2.1 PenTest Report (OHU).docx 974KB 9. Writing Great Reports/2.2 PenTest Report (OHU).pdf 813KB 5. Exploitation/1. LAB 1 - Exploitation with Metasploit Framework.srt 42KB 5. Exploitation/2. LAB 2 - Exploitation using Manual Public Exploits.srt 39KB 2. Fundamentals/4. Theoretical Basics [EXTREMELY IMPORTANT].srt 37KB 6. Web Penetration Test/6. Important Specific Vulnerabilities such as SQL Injection in-depth.srt 35KB 6. Web Penetration Test/3. CMS Hacking - General Brute Forcing & Exploitation.srt 34KB 4. Vulnerability Analysis/2. Manually Identify, Analyze and Rank Vulnerabilities.srt 34KB 9. Writing Great Reports/1. Clean Documentation in a Professional Test.srt 33KB 4. Vulnerability Analysis/3. Automated Vulnerability Assessment using Nessus.srt 29KB 8. Security Controls Evasion/4. #2 Bypass Antivirus - The Actual Evasion Technique!.srt 28KB 6. Web Penetration Test/4. Do you know the Power of Version Numbers - Part 1.srt 25KB 7. Network PenTesting/3. The Core of Network Testing - Part 2.srt 23KB 7. Network PenTesting/8. Privilege Escalation Techniques - Part 1.srt 23KB 7. Network PenTesting/9. Privilege Escalation Techniques - Part 2.srt 22KB 6. Web Penetration Test/7. Important Specific Vulnerabilities such as XSS in-depth.srt 22KB 7. Network PenTesting/2. The Core of Network Testing - Part 1.srt 22KB 7. Network PenTesting/11. Privilege Escalation Techniques - Part 4.srt 20KB 6. Web Penetration Test/1. CMS Hacking - Initial Information Gathering.srt 19KB 6. Web Penetration Test/5. Do you know the Power of Version Numbers - Part 2.srt 19KB 6. Web Penetration Test/8. Important Specific Vulnerabilities such as File Upload & Command Injection.srt 19KB 6. Web Penetration Test/10. Part 2 Web Server Hacking Risky PUT & DELETE Methods.srt 18KB 6. Web Penetration Test/2. CMS Hacking - Directory Busting and CMS Scanning.srt 18KB 2. Fundamentals/1. Lab Setup using the VMware Player.srt 18KB 7. Network PenTesting/5. Post Exploitation using Metasploit - Part 1.srt 18KB 3. Information Gathering/6. Active Reconnaissance - Part 2.srt 17KB 6. Web Penetration Test/9. Part 1 Web Server Hacking Intro & Enumeration Ideas.srt 16KB 3. Information Gathering/2. Passive Reconnaissance - Part 2.srt 16KB 7. Network PenTesting/6. Post Exploitation using Metasploit - Part 2.srt 15KB 3. Information Gathering/1. Passive Reconnaissance - Part 1.srt 15KB 3. Information Gathering/3. Passive Reconnaissance - Part 3.srt 15KB 8. Security Controls Evasion/3. #1 Bypass Antivirus - Making the Base Payload.srt 14KB 7. Network PenTesting/4. The Core of Network Testing - Part 3.srt 14KB 7. Network PenTesting/7. Post Exploitation using Metasploit - Part 3.srt 14KB 3. Information Gathering/7. Active Reconnaissance - Part 3.srt 14KB 3. Information Gathering/5. Active Reconnaissance - Part 1.srt 13KB 4. Vulnerability Analysis/4. Automated Vulnerability Assessment - Nmap & VEGA.srt 13KB 6. Web Penetration Test/11. Part 3 Web Server Hacking SSH Brute Forcing w Hydra.srt 11KB 3. Information Gathering/8.1 Target DB.xlsx 10KB 7. Network PenTesting/10. Privilege Escalation Techniques - Part 3.srt 10KB 1. Opening Lectures/1. Introduction to the Course - Do Not Skip.srt 10KB 1. Opening Lectures/5. How to get answers to your questions and help with problems.srt 7KB 1. Opening Lectures/4. What can you do to get the most out of this course.srt 7KB 2. Fundamentals/2. Terminal - Few Survival Commands to know (Optional).html 6KB 3. Information Gathering/4. Store Passive Data in the Right Way.html 4KB 8. Security Controls Evasion/2. Introduction to Virus and Antivirus Software.html 3KB 10. Happy Ending Lectures/4. Thank you very much for completing this course!.srt 3KB 10. Happy Ending Lectures/1. How to go more advanced with this course.html 3KB 10. Happy Ending Lectures/2. Unlock your certificate and upgrade your LinkedIn profile using this course!.srt 3KB 1. Opening Lectures/3. Thankyou for taking this course. What should you expect.html 2KB 7. Network PenTesting/13. Spawning Stable Shells.html 2KB 11. BONUS Section/1. Bonus Lecture.html 2KB 2. Fundamentals/3. Terminal - Tips and Tricks you should apply now (Optional).html 2KB 1. Opening Lectures/2. Disclaimer.html 2KB 7. Network PenTesting/1. Upcoming Lectures with their Exact Release Date!.html 2KB 10. Happy Ending Lectures/3. What's your next step after doing this course.html 1KB 5. Exploitation/3. Essential Things You Should Know.html 1KB 8. Security Controls Evasion/1. Upcoming Lectures with their Exact Release Date!.html 1KB 4. Vulnerability Analysis/1. What is a Vulnerability Assessment.html 995B 9. Writing Great Reports/2. Report Writing with Perfect Examples.html 990B 3. Information Gathering/8. Store Active Data in the Right Way.html 662B 2. Fundamentals/1.2 Kali Linux Virtual Machine File - OHU.html 133B 0. Websites you may like/[CourseClub.Me].url 122B 1. Opening Lectures/[CourseClub.Me].url 122B 11. BONUS Section/[CourseClub.Me].url 122B 7. Network PenTesting/[CourseClub.Me].url 122B [CourseClub.Me].url 122B 2. Fundamentals/1.1 First Target Machine Basic PenTesting 1.html 114B 0. Websites you may like/[GigaCourse.Com].url 49B 1. Opening Lectures/[GigaCourse.Com].url 49B 11. BONUS Section/[GigaCourse.Com].url 49B 7. Network PenTesting/[GigaCourse.Com].url 49B [GigaCourse.Com].url 49B