589689.xyz

[] TCM Security Academy - Practical Ethical Hacking [2021]

  • 收录时间:2022-01-21 21:41:58
  • 文件大小:12GB
  • 下载次数:1
  • 最近下载:2022-01-21 21:41:58
  • 磁力链接:

文件列表

  1. 13. Mid-Course Capstone/2. Walkthrough - Legacy.mp4 332MB
  2. 13. Mid-Course Capstone/6. Walkthrough - Jerry.mp4 305MB
  3. 13. Mid-Course Capstone/7. Walkthrough - Nibbles.mp4 285MB
  4. 13. Mid-Course Capstone/4. Walkthrough - Blue.mp4 284MB
  5. 13. Mid-Course Capstone/3. Walkthrough - Lame.mp4 280MB
  6. 7. Introduction to Python/16. Building a Port Scanner.mp4 270MB
  7. 13. Mid-Course Capstone/5. Walkthrough - Devel.mp4 247MB
  8. 13. Mid-Course Capstone/9. Walkthrough - Bashed.mp4 242MB
  9. 13. Mid-Course Capstone/8. Walkthrough - Optimum.mp4 236MB
  10. 13. Mid-Course Capstone/11. Walkthrough - Netmon.mp4 234MB
  11. 4. Networking Refresher/7. Subnetting Part 1 - Methodology.mp4 208MB
  12. 13. Mid-Course Capstone/10. Walkthrough - Grandpa.mp4 163MB
  13. 12. Exploitation Basics/6. Password Spraying and Credential Stuffing.mp4 157MB
  14. 17. Attacking Active Directory Initial Attack Vectors/4. Password Cracking with Hashcat.mp4 154MB
  15. 10. Scanning & Enumeration/4. Enumerating HTTPHTTPS - Part 2.mp4 151MB
  16. 7. Introduction to Python/13. Advanced Strings.mp4 145MB
  17. 7. Introduction to Python/9. Lists.mp4 143MB
  18. 18. Attacking Active Directory Post-Compromise Enumeration/3. Domain Enumeration with PowerView.mp4 139MB
  19. 10. Scanning & Enumeration/7. Researching Potential Vulnerabilities.mp4 139MB
  20. 12. Exploitation Basics/4. Manual Exploitation.mp4 136MB
  21. 6. Introduction to Linux/8. Scripting with Bash.mp4 133MB
  22. 10. Scanning & Enumeration/2. Scanning with Nmap.mp4 133MB
  23. 22. Testing the Top 10 Web Application Vulnerabilities/2. The OWASP Top 10 and OWASP Testing Checklist.mp4 130MB
  24. 23. Wireless Penetration Testing/2. WPA PSK Exploit Walkthrough.mp4 127MB
  25. 7. Introduction to Python/8. Conditional Statements.mp4 122MB
  26. 7. Introduction to Python/14. Dictionaries.mp4 115MB
  27. 6. Introduction to Linux/2. Navigating the File System.mp4 113MB
  28. 10. Scanning & Enumeration/3. Enumerating HTTPHTTPS - Part 1.mp4 111MB
  29. 7. Introduction to Python/4. Variables & Methods.mp4 111MB
  30. 22. Testing the Top 10 Web Application Vulnerabilities/5. Exploring Burp Suite.mp4 106MB
  31. 9. Information Gathering (Reconnaissance)/9. Information Gathering with Burp Suite.mp4 106MB
  32. 16. Active Directory Lab Build/5. Setting Up Users, Groups, and Policies.mp4 100MB
  33. 11. Additional Scanning Tools/3. Scanning with Nessus - Part 1.mp4 99MB
  34. 7. Introduction to Python/5. Functions.mp4 97MB
  35. 9. Information Gathering (Reconnaissance)/8. Identifying Website Technologies.mp4 96MB
  36. 6. Introduction to Linux/3. Users and Privileges.mp4 94MB
  37. 12. Exploitation Basics/5. Brute Force Attacks.mp4 93MB
  38. 10. Scanning & Enumeration/5. Enumerating SMB.mp4 90MB
  39. 22. Testing the Top 10 Web Application Vulnerabilities/3. Installing OWASP Juice Shop.mp4 89MB
  40. 17. Attacking Active Directory Initial Attack Vectors/16. IPv6 DNS Takeover via mitm6.mp4 87MB
  41. 22. Testing the Top 10 Web Application Vulnerabilities/8. SQL Injection Walkthrough.mp4 85MB
  42. 6. Introduction to Linux/6. Starting and Stopping Kali Services.mp4 82MB
  43. 22. Testing the Top 10 Web Application Vulnerabilities/19. Cross-Site Scripting (XSS) Overview.mp4 82MB
  44. 22. Testing the Top 10 Web Application Vulnerabilities/13. Testing for Sensitive Data Exposure.mp4 80MB
  45. 9. Information Gathering (Reconnaissance)/6. Hunting Subdomains - Part 1.mp4 80MB
  46. 16. Active Directory Lab Build/6. Joining Our Machines to the Domain.mp4 79MB
  47. 24. Legal Documents and Report Writing/3. Reviewing a Real Pentest Report.mp4 79MB
  48. 22. Testing the Top 10 Web Application Vulnerabilities/10. Broken Authentication Overview and Defenses.mp4 79MB
  49. 4. Networking Refresher/2. IP Addresses.mp4 78MB
  50. 22. Testing the Top 10 Web Application Vulnerabilities/15. XXE Attack and Defense.mp4 77MB
  51. 16. Active Directory Lab Build/3. Setting Up the Domain Controller.mp4 76MB
  52. 13. Mid-Course Capstone/1. Introduction.mp4 76MB
  53. 21. Web Application Enumeration, Revisited/5. Finding Alive Domains with Httprobe.mp4 76MB
  54. 6. Introduction to Linux/7. Installing and Updating Tools.mp4 76MB
  55. 7. Introduction to Python/7. Relational and Boolean Operators.mp4 75MB
  56. 22. Testing the Top 10 Web Application Vulnerabilities/20. Reflected XSS Walkthrough.mp4 74MB
  57. 19. Attacking Active Directory Post-Compromise Attacks/19. Credential Dumping with Mimikatz.mp4 72MB
  58. 6. Introduction to Linux/1. Exploring Kali Linux.mp4 70MB
  59. 19. Attacking Active Directory Post-Compromise Attacks/21. Conclusion and Additional Resources.mp4 70MB
  60. 9. Information Gathering (Reconnaissance)/4. Gathering Breached Credentials with Breach-Parse.mp4 70MB
  61. 22. Testing the Top 10 Web Application Vulnerabilities/18. Security Misconfiguration Attacks and Defenses.mp4 68MB
  62. 19. Attacking Active Directory Post-Compromise Attacks/4. Pass the Password Attacks.mp4 67MB
  63. 22. Testing the Top 10 Web Application Vulnerabilities/12. Sensitive Data Exposure Overview and Defenses.mp4 67MB
  64. 9. Information Gathering (Reconnaissance)/7. Hunting Subdomains - Part 2.mp4 66MB
  65. 14. Introduction to Exploit Development (Buffer Overflows)/8. Finding the Right Module.mp4 66MB
  66. 6. Introduction to Linux/4. Common Network Commands.mp4 64MB
  67. 22. Testing the Top 10 Web Application Vulnerabilities/11. Testing for Broken Authentication.mp4 64MB
  68. 19. Attacking Active Directory Post-Compromise Attacks/16. Abusing GPP Part 1.mp4 63MB
  69. 24. Legal Documents and Report Writing/2. Pentest Report Writing.mp4 63MB
  70. 17. Attacking Active Directory Initial Attack Vectors/12. Gaining Shell Access.mp4 61MB
  71. 14. Introduction to Exploit Development (Buffer Overflows)/3. Spiking.mp4 60MB
  72. 21. Web Application Enumeration, Revisited/7. Automating the Enumeration Process.mp4 60MB
  73. 20. Post Exploitation/4. Pivoting Lab Setup.mp4 59MB
  74. 7. Introduction to Python/11. Looping.mp4 59MB
  75. 14. Introduction to Exploit Development (Buffer Overflows)/1. Required Installations.mp4 58MB
  76. 9. Information Gathering (Reconnaissance)/10. Google Fu.mp4 58MB
  77. 22. Testing the Top 10 Web Application Vulnerabilities/23. Insecure Deserialization.mp4 57MB
  78. 21. Web Application Enumeration, Revisited/4. Finding Subdomains with Amass.mp4 57MB
  79. 7. Introduction to Python/2. Strings.mp4 55MB
  80. 5. Setting Up Our Lab/1. Installing VMWare Virtualbox.mp4 55MB
  81. 12. Exploitation Basics/3. Gaining Root with Metasploit.mp4 54MB
  82. 19. Attacking Active Directory Post-Compromise Attacks/7. Pass the Hash Attacks.mp4 54MB
  83. 22. Testing the Top 10 Web Application Vulnerabilities/24. Using Components with Known Vulnerabilities.mp4 53MB
  84. 17. Attacking Active Directory Initial Attack Vectors/3. Capturing NTLMv2 Hashes with Responder.mp4 53MB
  85. 19. Attacking Active Directory Post-Compromise Attacks/20. Golden Ticket Attacks.mp4 52MB
  86. 20. Post Exploitation/5. Pivoting Walkthrough.mp4 52MB
  87. 17. Attacking Active Directory Initial Attack Vectors/9. SMB Relay Attack Demonstration Part 1.mp4 52MB
  88. 9. Information Gathering (Reconnaissance)/5. Utilizing theharvester.mp4 51MB
  89. 7. Introduction to Python/12. Importing Modules.mp4 51MB
  90. 11. Additional Scanning Tools/4. Scanning with Nessus - Part 2.mp4 51MB
  91. 3. Note Keeping/1. Part 1 Effective Note Keeping.mp4 49MB
  92. 22. Testing the Top 10 Web Application Vulnerabilities/21. Stored XSS Walkthrough.mp4 49MB
  93. 21. Web Application Enumeration, Revisited/2. Installing Go.mp4 49MB
  94. 22. Testing the Top 10 Web Application Vulnerabilities/16. Broken Access Control Overview.mp4 49MB
  95. 23. Wireless Penetration Testing/1. Wireless Penetration Testing Overview.mp4 48MB
  96. 19. Attacking Active Directory Post-Compromise Attacks/10. Token Impersonation with Incognito.mp4 48MB
  97. 7. Introduction to Python/15. Sockets.mp4 47MB
  98. 17. Attacking Active Directory Initial Attack Vectors/2. LLMNR Poisoning Overview.mp4 46MB
  99. 5. Setting Up Our Lab/3. Installing Kali Linux.mp4 45MB
  100. 10. Scanning & Enumeration/1. Installing Kioptrix Level 1.mp4 45MB
  101. 14. Introduction to Exploit Development (Buffer Overflows)/7. Finding Bad Characters.mp4 45MB
  102. 19. Attacking Active Directory Post-Compromise Attacks/13. Kerberoasting Walkthrough.mp4 43MB
  103. 7. Introduction to Python/3. Math.mp4 43MB
  104. 9. Information Gathering (Reconnaissance)/2. Identifying Our Target.mp4 43MB
  105. 26. BONUS Section/1. BONUS LECTURE Course Discord Channel and Other Author Resources.mp4 43MB
  106. 17. Attacking Active Directory Initial Attack Vectors/8. Discovering Hosts with SMB Signing Disabled.mp4 42MB
  107. 14. Introduction to Exploit Development (Buffer Overflows)/5. Finding the Offset.mp4 42MB
  108. 19. Attacking Active Directory Post-Compromise Attacks/17. Abusing GPP Part 2.mp4 42MB
  109. 2. Introduction/3. A Day in the Life of an Ethical Hacker.mp4 41MB
  110. 22. Testing the Top 10 Web Application Vulnerabilities/25. Insufficient Logging and Monitoring.mp4 41MB
  111. 9. Information Gathering (Reconnaissance)/11. Utilizing Social Media.mp4 40MB
  112. 6. Introduction to Linux/5. Viewing, Creating, and Editing Files.mp4 40MB
  113. 3. Note Keeping/2. Part 2 Important Tools.mp4 39MB
  114. 7. Introduction to Python/6. Boolean Expressions.mp4 37MB
  115. 12. Exploitation Basics/1. Reverse Shells vs Bind Shells.mp4 37MB
  116. 25. Career Advice/1. Career Advice.mp4 37MB
  117. 21. Web Application Enumeration, Revisited/3. Finding Subdomains with Assetfinder.mp4 36MB
  118. 4. Networking Refresher/8. Subnetting Part 2 - Hands-On Challenge.mp4 36MB
  119. 18. Attacking Active Directory Post-Compromise Enumeration/4. Bloodhound Overview and Setup.mp4 36MB
  120. 16. Active Directory Lab Build/4. Setting Up the User Machines.mp4 36MB
  121. 22. Testing the Top 10 Web Application Vulnerabilities/17. Broken Access Control Walkthrough.mp4 35MB
  122. 14. Introduction to Exploit Development (Buffer Overflows)/9. Generating Shellcode and Getting Root.mp4 35MB
  123. 18. Attacking Active Directory Post-Compromise Enumeration/6. Enumerating Domain Data with Bloodhound.mp4 35MB
  124. 21. Web Application Enumeration, Revisited/6. Screenshotting Websites with GoWitness.mp4 34MB
  125. 19. Attacking Active Directory Post-Compromise Attacks/18. Mimikatz Overview.mp4 33MB
  126. 7. Introduction to Python/10. Tuples.mp4 32MB
  127. 18. Attacking Active Directory Post-Compromise Enumeration/5. Grabbing Data with Invoke-Bloodhound.mp4 32MB
  128. 10. Scanning & Enumeration/6. Enumerating SSH.mp4 31MB
  129. 22. Testing the Top 10 Web Application Vulnerabilities/6. Introducing the Score Board.mp4 31MB
  130. 14. Introduction to Exploit Development (Buffer Overflows)/2. Buffer Overflows Explained.mp4 30MB
  131. 17. Attacking Active Directory Initial Attack Vectors/10. SMB Relay Attack Demonstration Part 2.mp4 30MB
  132. 14. Introduction to Exploit Development (Buffer Overflows)/4. Fuzzing.mp4 30MB
  133. 4. Networking Refresher/3. MAC Addresses.mp4 29MB
  134. 22. Testing the Top 10 Web Application Vulnerabilities/14. XML External Entities (XXE) Overview.mp4 28MB
  135. 19. Attacking Active Directory Post-Compromise Attacks/6. Cracking NTLM Hashes with Hashcat.mp4 27MB
  136. 22. Testing the Top 10 Web Application Vulnerabilities/4. Installing Foxy Proxy.mp4 27MB
  137. 17. Attacking Active Directory Initial Attack Vectors/18. Other Attack Vectors and Strategies.mp4 27MB
  138. 17. Attacking Active Directory Initial Attack Vectors/6. SMB Relay Attacks Overview.mp4 27MB
  139. 11. Additional Scanning Tools/1. Scanning with Masscan.mp4 26MB
  140. 19. Attacking Active Directory Post-Compromise Attacks/12. Kerberoasting Overview.mp4 26MB
  141. 17. Attacking Active Directory Initial Attack Vectors/1. Introduction.mp4 26MB
  142. 24. Legal Documents and Report Writing/1. Common Legal Documents.mp4 25MB
  143. 19. Attacking Active Directory Post-Compromise Attacks/5. Dumping Hashes with secretsdump.py.mp4 24MB
  144. 15. Active Directory Overview/3. Logical Active Directory Components.mp4 23MB
  145. 11. Additional Scanning Tools/2. Scanning with Metasploit.mp4 23MB
  146. 15. Active Directory Overview/1. Active Directory Overview.mp4 23MB
  147. 19. Attacking Active Directory Post-Compromise Attacks/15. GPP cPassword Attacks Overview.mp4 22MB
  148. 4. Networking Refresher/4. TCP, UDP, and the Three-Way Handshake.mp4 22MB
  149. 9. Information Gathering (Reconnaissance)/1. Passive Reconnaissance Overview.mp4 21MB
  150. 9. Information Gathering (Reconnaissance)/3. E-Mail Address Gathering with Hunter.io.mp4 20MB
  151. 18. Attacking Active Directory Post-Compromise Enumeration/2. PowerView Overview.mp4 20MB
  152. 15. Active Directory Overview/2. Physical Active Directory Components.mp4 20MB
  153. 17. Attacking Active Directory Initial Attack Vectors/17. IPv6 Attack Defenses.mp4 20MB
  154. 22. Testing the Top 10 Web Application Vulnerabilities/7. SQL Injection Attacks Overview.mp4 19MB
  155. 17. Attacking Active Directory Initial Attack Vectors/5. LLMNR Poisoning Defenses.mp4 18MB
  156. 19. Attacking Active Directory Post-Compromise Attacks/2. Pass the Hash Password Overview.mp4 18MB
  157. 16. Active Directory Lab Build/2. Downloading Necessary ISOs.mp4 18MB
  158. 12. Exploitation Basics/7. Our Notes, Revisited.mp4 17MB
  159. 4. Networking Refresher/5. Common Ports and Protocols.mp4 17MB
  160. 14. Introduction to Exploit Development (Buffer Overflows)/6. Overwriting the EIP.mp4 17MB
  161. 19. Attacking Active Directory Post-Compromise Attacks/9. Token Impersonation Overview.mp4 16MB
  162. 10. Scanning & Enumeration/8. Our Notes, so Far.mp4 16MB
  163. 19. Attacking Active Directory Post-Compromise Attacks/11. Token Impersonation Mitigation.mp4 15MB
  164. 19. Attacking Active Directory Post-Compromise Attacks/8. Pass Attack Mitigations.mp4 14MB
  165. 8. The Ethical Hacker Methodology/1. The Five Stages of Ethical Hacking.mp4 14MB
  166. 17. Attacking Active Directory Initial Attack Vectors/14. Installing mitm6.mp4 14MB
  167. 17. Attacking Active Directory Initial Attack Vectors/15. Setting Up LDAPS.mp4 13MB
  168. 17. Attacking Active Directory Initial Attack Vectors/11. SMB Relay Attack Defenses.mp4 13MB
  169. 12. Exploitation Basics/2. Staged vs Non-Staged Payloads.mp4 13MB
  170. 4. Networking Refresher/6. The OSI Model.mp4 13MB
  171. 22. Testing the Top 10 Web Application Vulnerabilities/22. Preventing XSS.mp4 12MB
  172. 2. Introduction/1. Introduction and Course Overview.mp4 10MB
  173. 22. Testing the Top 10 Web Application Vulnerabilities/9. SQL Injection Defenses.mp4 9MB
  174. 17. Attacking Active Directory Initial Attack Vectors/7. Quick Lab Update.mp4 9MB
  175. 17. Attacking Active Directory Initial Attack Vectors/13. IPv6 Attacks Overview.mp4 9MB
  176. 19. Attacking Active Directory Post-Compromise Attacks/3. Installing crackmapexec.mp4 8MB
  177. 20. Post Exploitation/2. File Transfers Review.mp4 8MB
  178. 2. Introduction/2. Frequently Asked Questions Guide.mp4 8MB
  179. 20. Post Exploitation/3. Maintaining Access Overview.mp4 8MB
  180. 7. Introduction to Python/1. Introduction.mp4 8MB
  181. 16. Active Directory Lab Build/1. Lab Overview and Requirements.mp4 8MB
  182. 19. Attacking Active Directory Post-Compromise Attacks/14. Kerberoasting Mitigation.mp4 7MB
  183. 20. Post Exploitation/6. Cleaning Up.mp4 6MB
  184. 22. Testing the Top 10 Web Application Vulnerabilities/1. Introduction.mp4 4MB
  185. 21. Web Application Enumeration, Revisited/1. Introduction.mp4 4MB
  186. 18. Attacking Active Directory Post-Compromise Enumeration/1. Introduction.mp4 4MB
  187. 4. Networking Refresher/1. Introduction.mp4 3MB
  188. 5. Setting Up Our Lab/2. Linux Image Repository (UPDATE).mp4 3MB
  189. 20. Post Exploitation/1. Introduction.mp4 3MB
  190. 19. Attacking Active Directory Post-Compromise Attacks/1. Introduction.mp4 2MB
  191. 24. Legal Documents and Report Writing/2.2 Demo Company - Security Assessment Findings Report.pdf 319KB
  192. 1. Course Resources/1.2 Practical Ethical Hacking - FAQ.pdf 163KB
  193. 2. Introduction/2.2 Practical Ethical Hacking - FAQ.pdf 163KB
  194. 13. Mid-Course Capstone/2. Walkthrough - Legacy.srt 49KB
  195. 13. Mid-Course Capstone/3. Walkthrough - Lame.srt 47KB
  196. 13. Mid-Course Capstone/6. Walkthrough - Jerry.srt 47KB
  197. 13. Mid-Course Capstone/7. Walkthrough - Nibbles.srt 43KB
  198. 13. Mid-Course Capstone/4. Walkthrough - Blue.srt 43KB
  199. 13. Mid-Course Capstone/9. Walkthrough - Bashed.srt 41KB
  200. 4. Networking Refresher/7. Subnetting Part 1 - Methodology.srt 39KB
  201. 13. Mid-Course Capstone/5. Walkthrough - Devel.srt 39KB
  202. 13. Mid-Course Capstone/8. Walkthrough - Optimum.srt 36KB
  203. 13. Mid-Course Capstone/11. Walkthrough - Netmon.srt 35KB
  204. 6. Introduction to Linux/8. Scripting with Bash.srt 30KB
  205. 10. Scanning & Enumeration/2. Scanning with Nmap.srt 29KB
  206. 7. Introduction to Python/16. Building a Port Scanner.srt 28KB
  207. 2. Introduction/3. A Day in the Life of an Ethical Hacker.srt 26KB
  208. 18. Attacking Active Directory Post-Compromise Enumeration/3. Domain Enumeration with PowerView.srt 23KB
  209. 10. Scanning & Enumeration/5. Enumerating SMB.srt 22KB
  210. 10. Scanning & Enumeration/4. Enumerating HTTPHTTPS - Part 2.srt 22KB
  211. 10. Scanning & Enumeration/7. Researching Potential Vulnerabilities.srt 21KB
  212. 13. Mid-Course Capstone/10. Walkthrough - Grandpa.srt 21KB
  213. 10. Scanning & Enumeration/3. Enumerating HTTPHTTPS - Part 1.srt 21KB
  214. 12. Exploitation Basics/6. Password Spraying and Credential Stuffing.srt 20KB
  215. 16. Active Directory Lab Build/5. Setting Up Users, Groups, and Policies.srt 20KB
  216. 23. Wireless Penetration Testing/2. WPA PSK Exploit Walkthrough.srt 20KB
  217. 24. Legal Documents and Report Writing/3. Reviewing a Real Pentest Report.srt 20KB
  218. 4. Networking Refresher/2. IP Addresses.srt 18KB
  219. 24. Legal Documents and Report Writing/2. Pentest Report Writing.srt 18KB
  220. 7. Introduction to Python/13. Advanced Strings.srt 17KB
  221. 16. Active Directory Lab Build/3. Setting Up the Domain Controller.srt 17KB
  222. 12. Exploitation Basics/4. Manual Exploitation.srt 17KB
  223. 25. Career Advice/1. Career Advice.srt 17KB
  224. 23. Wireless Penetration Testing/1. Wireless Penetration Testing Overview.srt 17KB
  225. 6. Introduction to Linux/2. Navigating the File System.srt 16KB
  226. 17. Attacking Active Directory Initial Attack Vectors/4. Password Cracking with Hashcat.srt 16KB
  227. 11. Additional Scanning Tools/3. Scanning with Nessus - Part 1.srt 16KB
  228. 22. Testing the Top 10 Web Application Vulnerabilities/5. Exploring Burp Suite.srt 16KB
  229. 22. Testing the Top 10 Web Application Vulnerabilities/2. The OWASP Top 10 and OWASP Testing Checklist.srt 16KB
  230. 22. Testing the Top 10 Web Application Vulnerabilities/19. Cross-Site Scripting (XSS) Overview.srt 15KB
  231. 4. Networking Refresher/7.2 Subnet-Guide.xlsx 15KB
  232. 14. Introduction to Exploit Development (Buffer Overflows)/3. Spiking.srt 15KB
  233. 22. Testing the Top 10 Web Application Vulnerabilities/8. SQL Injection Walkthrough.srt 14KB
  234. 7. Introduction to Python/9. Lists.srt 14KB
  235. 7. Introduction to Python/4. Variables & Methods.srt 14KB
  236. 7. Introduction to Python/5. Functions.srt 14KB
  237. 9. Information Gathering (Reconnaissance)/9. Information Gathering with Burp Suite.srt 14KB
  238. 17. Attacking Active Directory Initial Attack Vectors/18. Other Attack Vectors and Strategies.srt 13KB
  239. 6. Introduction to Linux/3. Users and Privileges.srt 13KB
  240. 22. Testing the Top 10 Web Application Vulnerabilities/14. XML External Entities (XXE) Overview.srt 13KB
  241. 19. Attacking Active Directory Post-Compromise Attacks/19. Credential Dumping with Mimikatz.srt 13KB
  242. 13. Mid-Course Capstone/1. Introduction.srt 12KB
  243. 19. Attacking Active Directory Post-Compromise Attacks/16. Abusing GPP Part 1.srt 12KB
  244. 16. Active Directory Lab Build/6. Joining Our Machines to the Domain.srt 12KB
  245. 18. Attacking Active Directory Post-Compromise Enumeration/6. Enumerating Domain Data with Bloodhound.srt 12KB
  246. 12. Exploitation Basics/3. Gaining Root with Metasploit.srt 11KB
  247. 9. Information Gathering (Reconnaissance)/1. Passive Reconnaissance Overview.srt 11KB
  248. 22. Testing the Top 10 Web Application Vulnerabilities/15. XXE Attack and Defense.srt 11KB
  249. 14. Introduction to Exploit Development (Buffer Overflows)/8. Finding the Right Module.srt 11KB
  250. 24. Legal Documents and Report Writing/1. Common Legal Documents.srt 11KB
  251. 7. Introduction to Python/8. Conditional Statements.srt 11KB
  252. 22. Testing the Top 10 Web Application Vulnerabilities/13. Testing for Sensitive Data Exposure.srt 11KB
  253. 17. Attacking Active Directory Initial Attack Vectors/16. IPv6 DNS Takeover via mitm6.srt 11KB
  254. 17. Attacking Active Directory Initial Attack Vectors/2. LLMNR Poisoning Overview.srt 11KB
  255. 16. Active Directory Lab Build/4. Setting Up the User Machines.srt 11KB
  256. 22. Testing the Top 10 Web Application Vulnerabilities/11. Testing for Broken Authentication.srt 11KB
  257. 3. Note Keeping/1. Part 1 Effective Note Keeping.srt 11KB
  258. 15. Active Directory Overview/3. Logical Active Directory Components.srt 11KB
  259. 6. Introduction to Linux/6. Starting and Stopping Kali Services.srt 11KB
  260. 19. Attacking Active Directory Post-Compromise Attacks/20. Golden Ticket Attacks.srt 11KB
  261. 9. Information Gathering (Reconnaissance)/8. Identifying Website Technologies.srt 10KB
  262. 9. Information Gathering (Reconnaissance)/4. Gathering Breached Credentials with Breach-Parse.srt 10KB
  263. 22. Testing the Top 10 Web Application Vulnerabilities/3. Installing OWASP Juice Shop.srt 10KB
  264. 12. Exploitation Basics/1. Reverse Shells vs Bind Shells.srt 10KB
  265. 6. Introduction to Linux/7. Installing and Updating Tools.srt 10KB
  266. 10. Scanning & Enumeration/1. Installing Kioptrix Level 1.srt 10KB
  267. 22. Testing the Top 10 Web Application Vulnerabilities/20. Reflected XSS Walkthrough.srt 10KB
  268. 17. Attacking Active Directory Initial Attack Vectors/12. Gaining Shell Access.srt 10KB
  269. 7. Introduction to Python/2. Strings.srt 10KB
  270. 21. Web Application Enumeration, Revisited/5. Finding Alive Domains with Httprobe.srt 10KB
  271. 21. Web Application Enumeration, Revisited/3. Finding Subdomains with Assetfinder.srt 10KB
  272. 14. Introduction to Exploit Development (Buffer Overflows)/4. Fuzzing.srt 10KB
  273. 19. Attacking Active Directory Post-Compromise Attacks/4. Pass the Password Attacks.srt 9KB
  274. 12. Exploitation Basics/5. Brute Force Attacks.srt 9KB
  275. 11. Additional Scanning Tools/4. Scanning with Nessus - Part 2.srt 9KB
  276. 19. Attacking Active Directory Post-Compromise Attacks/10. Token Impersonation with Incognito.srt 9KB
  277. 14. Introduction to Exploit Development (Buffer Overflows)/9. Generating Shellcode and Getting Root.srt 9KB
  278. 22. Testing the Top 10 Web Application Vulnerabilities/21. Stored XSS Walkthrough.srt 9KB
  279. 7. Introduction to Python/14. Dictionaries.srt 9KB
  280. 3. Note Keeping/2. Part 2 Important Tools.srt 9KB
  281. 5. Setting Up Our Lab/1. Installing VMWare Virtualbox.srt 9KB
  282. 11. Additional Scanning Tools/1. Scanning with Masscan.srt 9KB
  283. 14. Introduction to Exploit Development (Buffer Overflows)/7. Finding Bad Characters.srt 9KB
  284. 15. Active Directory Overview/2. Physical Active Directory Components.srt 9KB
  285. 14. Introduction to Exploit Development (Buffer Overflows)/1. Required Installations.srt 9KB
  286. 19. Attacking Active Directory Post-Compromise Attacks/21. Conclusion and Additional Resources.srt 9KB
  287. 4. Networking Refresher/5. Common Ports and Protocols.srt 9KB
  288. 19. Attacking Active Directory Post-Compromise Attacks/18. Mimikatz Overview.srt 8KB
  289. 20. Post Exploitation/5. Pivoting Walkthrough.srt 8KB
  290. 22. Testing the Top 10 Web Application Vulnerabilities/10. Broken Authentication Overview and Defenses.srt 8KB
  291. 21. Web Application Enumeration, Revisited/7. Automating the Enumeration Process.srt 8KB
  292. 9. Information Gathering (Reconnaissance)/11. Utilizing Social Media.srt 8KB
  293. 20. Post Exploitation/4. Pivoting Lab Setup.srt 8KB
  294. 7. Introduction to Python/12. Importing Modules.srt 8KB
  295. 7. Introduction to Python/7. Relational and Boolean Operators.srt 8KB
  296. 4. Networking Refresher/4. TCP, UDP, and the Three-Way Handshake.srt 8KB
  297. 17. Attacking Active Directory Initial Attack Vectors/6. SMB Relay Attacks Overview.srt 8KB
  298. 5. Setting Up Our Lab/3. Installing Kali Linux.srt 8KB
  299. 7. Introduction to Python/15. Sockets.srt 8KB
  300. 22. Testing the Top 10 Web Application Vulnerabilities/18. Security Misconfiguration Attacks and Defenses.srt 8KB
  301. 19. Attacking Active Directory Post-Compromise Attacks/7. Pass the Hash Attacks.srt 8KB
  302. 6. Introduction to Linux/1. Exploring Kali Linux.srt 8KB
  303. 15. Active Directory Overview/1. Active Directory Overview.srt 8KB
  304. 4. Networking Refresher/6. The OSI Model.srt 8KB
  305. 6. Introduction to Linux/5. Viewing, Creating, and Editing Files.srt 8KB
  306. 9. Information Gathering (Reconnaissance)/10. Google Fu.srt 8KB
  307. 8. The Ethical Hacker Methodology/1. The Five Stages of Ethical Hacking.srt 8KB
  308. 19. Attacking Active Directory Post-Compromise Attacks/12. Kerberoasting Overview.srt 8KB
  309. 14. Introduction to Exploit Development (Buffer Overflows)/5. Finding the Offset.srt 8KB
  310. 7. Introduction to Python/3. Math.srt 7KB
  311. 6. Introduction to Linux/4. Common Network Commands.srt 7KB
  312. 21. Web Application Enumeration, Revisited/4. Finding Subdomains with Amass.srt 7KB
  313. 9. Information Gathering (Reconnaissance)/3. E-Mail Address Gathering with Hunter.io.srt 7KB
  314. 17. Attacking Active Directory Initial Attack Vectors/3. Capturing NTLMv2 Hashes with Responder.srt 7KB
  315. 17. Attacking Active Directory Initial Attack Vectors/9. SMB Relay Attack Demonstration Part 1.srt 7KB
  316. 9. Information Gathering (Reconnaissance)/6. Hunting Subdomains - Part 1.srt 7KB
  317. 22. Testing the Top 10 Web Application Vulnerabilities/7. SQL Injection Attacks Overview.srt 7KB
  318. 26. BONUS Section/1. BONUS LECTURE Course Discord Channel and Other Author Resources.srt 7KB
  319. 22. Testing the Top 10 Web Application Vulnerabilities/24. Using Components with Known Vulnerabilities.srt 7KB
  320. 22. Testing the Top 10 Web Application Vulnerabilities/12. Sensitive Data Exposure Overview and Defenses.srt 7KB
  321. 7. Introduction to Python/11. Looping.srt 7KB
  322. 9. Information Gathering (Reconnaissance)/7. Hunting Subdomains - Part 2.srt 6KB
  323. 22. Testing the Top 10 Web Application Vulnerabilities/17. Broken Access Control Walkthrough.srt 6KB
  324. 22. Testing the Top 10 Web Application Vulnerabilities/23. Insecure Deserialization.srt 6KB
  325. 2. Introduction/1. Introduction and Course Overview.srt 6KB
  326. 14. Introduction to Exploit Development (Buffer Overflows)/2. Buffer Overflows Explained.srt 6KB
  327. 17. Attacking Active Directory Initial Attack Vectors/1. Introduction.srt 6KB
  328. 19. Attacking Active Directory Post-Compromise Attacks/17. Abusing GPP Part 2.srt 6KB
  329. 7. Introduction to Python/6. Boolean Expressions.srt 6KB
  330. 17. Attacking Active Directory Initial Attack Vectors/13. IPv6 Attacks Overview.srt 6KB
  331. 10. Scanning & Enumeration/6. Enumerating SSH.srt 5KB
  332. 17. Attacking Active Directory Initial Attack Vectors/10. SMB Relay Attack Demonstration Part 2.srt 5KB
  333. 9. Information Gathering (Reconnaissance)/5. Utilizing theharvester.srt 5KB
  334. 19. Attacking Active Directory Post-Compromise Attacks/9. Token Impersonation Overview.srt 5KB
  335. 20. Post Exploitation/3. Maintaining Access Overview.srt 5KB
  336. 4. Networking Refresher/8. Subnetting Part 2 - Hands-On Challenge.srt 5KB
  337. 22. Testing the Top 10 Web Application Vulnerabilities/22. Preventing XSS.srt 5KB
  338. 9. Information Gathering (Reconnaissance)/2. Identifying Our Target.srt 5KB
  339. 19. Attacking Active Directory Post-Compromise Attacks/13. Kerberoasting Walkthrough.srt 5KB
  340. 18. Attacking Active Directory Post-Compromise Enumeration/4. Bloodhound Overview and Setup.srt 5KB
  341. 12. Exploitation Basics/7. Our Notes, Revisited.srt 5KB
  342. 17. Attacking Active Directory Initial Attack Vectors/8. Discovering Hosts with SMB Signing Disabled.srt 5KB
  343. 22. Testing the Top 10 Web Application Vulnerabilities/25. Insufficient Logging and Monitoring.srt 5KB
  344. 19. Attacking Active Directory Post-Compromise Attacks/5. Dumping Hashes with secretsdump.py.srt 5KB
  345. 10. Scanning & Enumeration/8. Our Notes, so Far.srt 5KB
  346. 21. Web Application Enumeration, Revisited/6. Screenshotting Websites with GoWitness.srt 5KB
  347. 22. Testing the Top 10 Web Application Vulnerabilities/16. Broken Access Control Overview.srt 5KB
  348. 4. Networking Refresher/3. MAC Addresses.srt 5KB
  349. 19. Attacking Active Directory Post-Compromise Attacks/6. Cracking NTLM Hashes with Hashcat.srt 5KB
  350. 19. Attacking Active Directory Post-Compromise Attacks/2. Pass the Hash Password Overview.srt 5KB
  351. 16. Active Directory Lab Build/1. Lab Overview and Requirements.srt 5KB
  352. 17. Attacking Active Directory Initial Attack Vectors/17. IPv6 Attack Defenses.srt 5KB
  353. 14. Introduction to Exploit Development (Buffer Overflows)/6. Overwriting the EIP.srt 4KB
  354. 21. Web Application Enumeration, Revisited/2. Installing Go.srt 4KB
  355. 19. Attacking Active Directory Post-Compromise Attacks/15. GPP cPassword Attacks Overview.srt 4KB
  356. 12. Exploitation Basics/2. Staged vs Non-Staged Payloads.srt 4KB
  357. 18. Attacking Active Directory Post-Compromise Enumeration/5. Grabbing Data with Invoke-Bloodhound.srt 4KB
  358. 22. Testing the Top 10 Web Application Vulnerabilities/6. Introducing the Score Board.srt 4KB
  359. 11. Additional Scanning Tools/2. Scanning with Metasploit.srt 4KB
  360. 19. Attacking Active Directory Post-Compromise Attacks/8. Pass Attack Mitigations.srt 4KB
  361. 20. Post Exploitation/6. Cleaning Up.srt 4KB
  362. 16. Active Directory Lab Build/2. Downloading Necessary ISOs.srt 4KB
  363. 17. Attacking Active Directory Initial Attack Vectors/5. LLMNR Poisoning Defenses.srt 4KB
  364. 19. Attacking Active Directory Post-Compromise Attacks/11. Token Impersonation Mitigation.srt 4KB
  365. 22. Testing the Top 10 Web Application Vulnerabilities/9. SQL Injection Defenses.srt 4KB
  366. 17. Attacking Active Directory Initial Attack Vectors/11. SMB Relay Attack Defenses.srt 4KB
  367. 20. Post Exploitation/2. File Transfers Review.srt 4KB
  368. 18. Attacking Active Directory Post-Compromise Enumeration/2. PowerView Overview.srt 3KB
  369. 7. Introduction to Python/10. Tuples.srt 3KB
  370. 7. Introduction to Python/1. Introduction.srt 3KB
  371. 22. Testing the Top 10 Web Application Vulnerabilities/4. Installing Foxy Proxy.srt 3KB
  372. 18. Attacking Active Directory Post-Compromise Enumeration/1. Introduction.srt 3KB
  373. 17. Attacking Active Directory Initial Attack Vectors/15. Setting Up LDAPS.srt 3KB
  374. 20. Post Exploitation/1. Introduction.srt 3KB
  375. 21. Web Application Enumeration, Revisited/1. Introduction.srt 3KB
  376. 5. Setting Up Our Lab/2. Linux Image Repository (UPDATE).srt 2KB
  377. 22. Testing the Top 10 Web Application Vulnerabilities/1. Introduction.srt 2KB
  378. 0. Websites you may like/For $3, Get Anything Official like Windows 11 keys + Microsoft Office 365 Accounts! Hurry! Limited Time Offer.url 2KB
  379. 4. Networking Refresher/1. Introduction.srt 2KB
  380. 19. Attacking Active Directory Post-Compromise Attacks/14. Kerberoasting Mitigation.srt 2KB
  381. 17. Attacking Active Directory Initial Attack Vectors/14. Installing mitm6.srt 2KB
  382. 19. Attacking Active Directory Post-Compromise Attacks/1. Introduction.srt 2KB
  383. 17. Attacking Active Directory Initial Attack Vectors/7. Quick Lab Update.srt 1KB
  384. 2. Introduction/2. Frequently Asked Questions Guide.srt 1KB
  385. 19. Attacking Active Directory Post-Compromise Attacks/3. Installing crackmapexec.srt 1KB
  386. 1. Course Resources/1. Course Resources.html 537B
  387. 0. Websites you may like/0. OneHack.us Premium Cracked Accounts-Tutorials-Guides-Articles Community Based Forum.url 377B
  388. 0. Websites you may like/1. FreeCoursesOnline.Me Download Udacity, Masterclass, Lynda, PHLearn, Pluralsight Free.url 286B
  389. 0. Websites you may like/3. FTUApps.com Download Cracked Developers Applications For Free.url 239B
  390. 6. Introduction to Linux/8.1 ipsweep.sh 213B
  391. 0. Websites you may like/How you can help our Group!.txt 204B
  392. 17. Attacking Active Directory Initial Attack Vectors/1.1 Top Five Ways I Got Domain Admin.html 190B
  393. 22. Testing the Top 10 Web Application Vulnerabilities/25.1 Top 10-2017 A10-Insufficient Logging & Monitoring.html 176B
  394. 22. Testing the Top 10 Web Application Vulnerabilities/2.3 OWASP Testing Guide.html 159B
  395. 22. Testing the Top 10 Web Application Vulnerabilities/24.1 Top 10-2017 A9-Using Components with Known Vulnerabilities.html 151B
  396. 5. Setting Up Our Lab/1.2 VMWare Workstation Player.html 146B
  397. 19. Attacking Active Directory Post-Compromise Attacks/15.1 Pentesting in the Real World Group Policy Pwnage.html 145B
  398. 5. Setting Up Our Lab/3.1 Kali Linux Download.html 143B
  399. 22. Testing the Top 10 Web Application Vulnerabilities/3.2 Installing Docker on Kali.html 142B
  400. 17. Attacking Active Directory Initial Attack Vectors/16.2 The worst of both worlds Combining NTLM Relaying and Kerberos delegation.html 140B
  401. 17. Attacking Active Directory Initial Attack Vectors/16.1 mitm6 – compromising IPv4 networks via IPv6.html 138B
  402. 22. Testing the Top 10 Web Application Vulnerabilities/14.1 Top 10-2017 A4-XML External Entities (XXE).html 135B
  403. 22. Testing the Top 10 Web Application Vulnerabilities/19.1 Top 10-2017 A7-Cross-Site Scripting (XSS).html 134B
  404. 22. Testing the Top 10 Web Application Vulnerabilities/18.1 Top 10-2017 A6-Security Misconfiguration.html 133B
  405. 22. Testing the Top 10 Web Application Vulnerabilities/23.1 Top 10-2017 A8-Insecure Deserialization.html 132B
  406. 3. Note Keeping/1.4 OneNote.html 132B
  407. 22. Testing the Top 10 Web Application Vulnerabilities/12.1 Top 10-2017 A3-Sensitive Data Exposure.html 131B
  408. 22. Testing the Top 10 Web Application Vulnerabilities/10.1 Top 10-2017 A2-Broken Authentication.html 129B
  409. 22. Testing the Top 10 Web Application Vulnerabilities/16.1 Top 10-2017 A5-Broken Access Control.html 129B
  410. 22. Testing the Top 10 Web Application Vulnerabilities/2.2 OWASP Top 10.html 129B
  411. 24. Legal Documents and Report Writing/2.1 Sample Pentest Report Github.html 129B
  412. 19. Attacking Active Directory Post-Compromise Attacks/21.5 eLearnSecurity PTX.html 127B
  413. 5. Setting Up Our Lab/2.1 Share Repository.html 127B
  414. 18. Attacking Active Directory Post-Compromise Enumeration/3.1 PowerView Cheat Sheet.html 125B
  415. 1. Course Resources/1.1 Course FAQ - External Option.html 124B
  416. 2. Introduction/2.1 Course FAQ - External Option.html 124B
  417. 22. Testing the Top 10 Web Application Vulnerabilities/7.1 Top 10-2017 A1-Injection.html 117B
  418. 22. Testing the Top 10 Web Application Vulnerabilities/2.1 OWASP Testing Checklist.html 114B
  419. 19. Attacking Active Directory Post-Compromise Attacks/21.1 Pentester Academy Active Directory Labs.html 112B
  420. 19. Attacking Active Directory Post-Compromise Attacks/21.2 Pentester Academy Red Team Labs.html 104B
  421. 4. Networking Refresher/7.1 Seven Second Subnetting.html 104B
  422. 21. Web Application Enumeration, Revisited/7.1 sumrecon - Github.html 102B
  423. 5. Setting Up Our Lab/1.1 Oracle VirtualBox.html 102B
  424. 22. Testing the Top 10 Web Application Vulnerabilities/3.1 OWASP Juice Shop.html 101B
  425. 19. Attacking Active Directory Post-Compromise Attacks/18.1 Mimikatz Github.html 99B
  426. 22. Testing the Top 10 Web Application Vulnerabilities/19.3 DOM BASED CROSS SITE SCRIPTING.html 98B
  427. 3. Note Keeping/1.1 Joplin.html 96B
  428. 3. Note Keeping/1.3 cherrytree.html 96B
  429. 21. Web Application Enumeration, Revisited/7.2 TCM's Modified Script.html 90B
  430. 22. Testing the Top 10 Web Application Vulnerabilities/19.2 XSS Game.html 90B
  431. 13. Mid-Course Capstone/3.1 Cracking Linux Hashes with Hashcat.html 89B
  432. 26. BONUS Section/1.1 The Cyber Mentor.html 87B
  433. 26. BONUS Section/1.2 Course Discord.html 87B
  434. 19. Attacking Active Directory Post-Compromise Attacks/21.3 Harmj0y Blog.html 85B
  435. 19. Attacking Active Directory Post-Compromise Attacks/21.4 Active Directory Security Blog.html 84B
  436. 3. Note Keeping/1.2 KeepNote.html 81B