the-redteam-blueprint 收录时间:2021-08-03 14:55:06 文件大小:16GB 下载次数:1 最近下载:2021-08-03 14:55:06 磁力链接: magnet:?xt=urn:btih:9724b2731d4dce0440c490ec7e13db424c18e8b7 立即下载 复制链接 文件列表 04 The Windows Operating System/002 Windows at a Glance.mp4 400MB 19 Exploitation/011 SQL Injection & SQLMap.mp4 378MB 18 Reconnaissance/008 Active Recon - Port Scanning.mp4 306MB 25 Job Hunting/006 Analyzing the Job Post.mp4 287MB 20 Post Exploitation/001 Stabilizing Shells.mp4 256MB 04 The Windows Operating System/006 Windows Internals - Permissions.mp4 252MB 18 Reconnaissance/013 Active Recon - Working with NC.mp4 248MB 16 Assembly Course/005 Arithmetic.mp4 230MB 23 Reporting/001 The Format.mp4 224MB 20 Post Exploitation/007 OS Version.mp4 204MB 19 Exploitation/005 Metasploit - Exploits and Payloads.mp4 185MB 04 The Windows Operating System/016 Windows Command Line - Working with Pipes.mp4 183MB 20 Post Exploitation/009 File Permissions.mp4 180MB 20 Post Exploitation/008 Common Configuration Issues.mp4 167MB 20 Post Exploitation/002 Breaking Out Of The Jail Shell.mp4 167MB 16 Assembly Course/002 Hello World.mp4 166MB 07 Active Directory/008 Setting up Group Policies.mp4 159MB 19 Exploitation/001 Finding Exploits.mp4 156MB 19 Exploitation/014 Local File Inclusion.mp4 149MB 19 Exploitation/006 Metasploit - The Meterpreter.mp4 149MB 04 The Windows Operating System/015 Windows Command Line - Working with Files and Directories.mp4 148MB 25 Job Hunting/004 Personal Brand.mp4 146MB 20 Post Exploitation/014 Service Misconfigurations.mp4 142MB 04 The Windows Operating System/007 Windows Internals - Alternate Data Streams.mp4 140MB 18 Reconnaissance/012 Active Recon - Sparta.mp4 137MB 04 The Windows Operating System/001 Installing & Using VirtualBox for Lab Virtualization.mp4 137MB 04 The Windows Operating System/014 Windows Command Line - Navigation.mp4 136MB 04 The Windows Operating System/008 Windows Internals - API Calls.mp4 136MB 25 Job Hunting/005 Searching for the Job.mp4 135MB 04 The Windows Operating System/004 Windows Logs.mp4 135MB 25 Job Hunting/001 The Resume.mp4 134MB 04 The Windows Operating System/018 Windows Command Line - Managing Windows.mp4 133MB 16 Assembly Course/008 Reading Files.mp4 130MB 20 Post Exploitation/010 MySQL.mp4 125MB 20 Post Exploitation/013 Unquoted Service Path.mp4 125MB 20 Post Exploitation/028 Pivoting.mp4 124MB 18 Reconnaissance/003 Passive Recon - Google.mp4 122MB 25 Job Hunting/009 Salary Requirements.mp4 120MB 19 Exploitation/012 XSS.mp4 118MB 04 The Windows Operating System/003 The Windows File System.mp4 118MB 25 Job Hunting/003 Certifications.mp4 117MB 07 Active Directory/007 Adding Machine to the Domain.mp4 115MB 25 Job Hunting/012 The Interview Process - The Technical Screening Interview.mp4 115MB 18 Reconnaissance/002 Installing Kali.mp4 115MB 19 Exploitation/010 The OWASP Top 10.mp4 115MB 16 Assembly Course/007 Logic Control.mp4 112MB 20 Post Exploitation/017 Pulling Hashes.mp4 107MB 19 Exploitation/004 Metasploit - What is Metasploit_.mp4 106MB 05 The Linux Operating System/012 Linux Processes.mp4 106MB 18 Reconnaissance/006 Passive Recon - Netcraft.mp4 105MB 25 Job Hunting/008 The Future Company.mp4 103MB 18 Reconnaissance/007 Passive Recon - Job Posting.mp4 101MB 13 Configuring PFSense Firewalls/004 Configuring a VPN.mp4 99MB 04 The Windows Operating System/012 Windows Internals - PE Files & DLLs.mp4 98MB 13 Configuring PFSense Firewalls/001 Installing PFSense.mp4 98MB 13 Configuring PFSense Firewalls/003 Configuring a DMZ.mp4 96MB 18 Reconnaissance/005 Passive Recon - Whois.mp4 96MB 03 Penetration Testing Process/003 Metrics & Why They Are Important.mp4 95MB 20 Post Exploitation/004 Windows Persistence.mp4 94MB 16 Assembly Course/004 Saving States.mp4 94MB 19 Exploitation/008 Metasploit - MSFVenom.mp4 93MB 20 Post Exploitation/015 LinuxPrivChecker.mp4 93MB 20 Post Exploitation/027 SSH Tunneling.mp4 92MB 19 Exploitation/015 Remote File Inclusion.mp4 92MB 20 Post Exploitation/012 Relative Path Sudo Binary.mp4 92MB 13 Configuring PFSense Firewalls/002 The Firewall UI.mp4 91MB 18 Reconnaissance/014 Active Recon - Banner Grabbing.mp4 91MB 07 Active Directory/003 Install AD DS.mp4 90MB 19 Exploitation/007 Metasploit - Adding an Exploit to Metasploit.mp4 90MB 25 Job Hunting/011 The Interview Process - Prepping for the Technical Interviews.mp4 88MB 07 Active Directory/005 OU's and their Permissions.mp4 88MB 04 The Windows Operating System/013 Windows Command Line - Accessing the Command Line.mp4 87MB 18 Reconnaissance/010 Active Recon - Nikto.mp4 87MB 05 The Linux Operating System/006 Linux Command Line - Working with Data.mp4 87MB 18 Reconnaissance/016 Active Recon - Browsing.mp4 84MB 24 Attacking Active Directory (Realistic Scenario)/006 Getting Domain Admin.mp4 83MB 22 Covering Your Tracks/003 Clearing Linux Logs.mp4 82MB 20 Post Exploitation/006 What is Privilege Escalation_.mp4 81MB 03 Penetration Testing Process/010 Building & Working with an Enterprise Budget.mp4 81MB 20 Post Exploitation/022 Network Traffic.mp4 81MB 20 Post Exploitation/019 SSH Keys.mp4 80MB 07 Active Directory/002 Basic Windows Server Configuration.mp4 77MB 07 Active Directory/004 The AD Tree.mp4 77MB 05 The Linux Operating System/004 Linux Command Line - Working with Files and Directories.mp4 77MB 20 Post Exploitation/011 Sudo.mp4 77MB 04 The Windows Operating System/005 Windows Internals - UAC.mp4 76MB 18 Reconnaissance/017 Active Recon - Manual vs Automated.mp4 76MB 03 Penetration Testing Process/009 Routine Assessments Part 6 - Building an Assessment Plan.mp4 76MB 18 Reconnaissance/009 Active Recon - DNS.mp4 74MB 20 Post Exploitation/023 ARP Poisoning.mp4 74MB 16 Assembly Course/009 Writing Files.mp4 68MB 24 Attacking Active Directory (Realistic Scenario)/004 Finding New Access.mp4 68MB 15 Python Course/007 If_Else.mp4 67MB 16 Assembly Course/010 Op Code.mp4 65MB 18 Reconnaissance/011 Active Recon - Dirb.mp4 64MB 16 Assembly Course/003 Variables.mp4 63MB 18 Reconnaissance/004 Passive Recon - Shodan.mp4 62MB 20 Post Exploitation/005 Linux Persistence.mp4 62MB 05 The Linux Operating System/014 Working with Open Files.mp4 61MB 22 Covering Your Tracks/004 Quick Talk on Logging.mp4 60MB 22 Covering Your Tracks/005 Clearing Command History.mp4 58MB 15 Python Course/014 Inheritance.mp4 56MB 21 Password Cracking/003 Hashcat.mp4 56MB 25 Job Hunting/007 Applying for the Job.mp4 56MB 20 Post Exploitation/016 Im Root Now What_.mp4 55MB 04 The Windows Operating System/017 Windows Command Line - Standard I_O_E.mp4 52MB 24 Attacking Active Directory (Realistic Scenario)/005 Moving Up In The World!.mp4 52MB 15 Python Course/018 Sockets.mp4 50MB 22 Covering Your Tracks/002 Clearing Windows Logs.mp4 49MB 07 Active Directory/009 Cached Credentials.mp4 48MB 06 Operating System Internals/010 Debuggers.mp4 47MB 15 Python Course/002 Installing Python.mp4 47MB 10 Networking/003 TCP_IP.mp4 47MB 15 Python Course/010 Lists.mp4 46MB 16 Assembly Course/006 Loops.mp4 46MB 15 Python Course/009 The Dictionary.mp4 45MB 19 Exploitation/016 The Authenticated Unauthenticated Pages.mp4 45MB 06 Operating System Internals/001 The Kernel.mp4 45MB 05 The Linux Operating System/017 Linux Pipes.mp4 45MB 22 Covering Your Tracks/007 The Clean Up.mp4 45MB 25 Job Hunting/015 The Interview Process - The Offer.mp4 45MB 05 The Linux Operating System/007 Linux Command Line - Working with File Permissions.mp4 44MB 13 Configuring PFSense Firewalls/005 Backup & Logging.mp4 44MB 24 Attacking Active Directory (Realistic Scenario)/003 Post Exploitation.mp4 42MB 02 The 3 Teams/002 The Red Team.mp4 42MB 10 Networking/009 DNS.mp4 42MB 15 Python Course/013 Classes.mp4 42MB 04 The Windows Operating System/011 Windows Internals - Named Pipes.mp4 42MB 05 The Linux Operating System/010 Linux Command Line - Hex.mp4 42MB 06 Operating System Internals/004 The CPU Registers.mp4 41MB 04 The Windows Operating System/010 Windows Internals - Tokens.mp4 41MB 20 Post Exploitation/026 Password Spraying.mp4 40MB 19 Exploitation/017 Broken Authentication and Session Management.mp4 40MB 03 Penetration Testing Process/006 Routine Assessments Part 3 - Quarterly Assessments_.mp4 40MB 05 The Linux Operating System/011 Linux Command Line - Network Connections Recap.mp4 40MB 15 Python Course/003 Hello World.mp4 40MB 15 Python Course/019 Threading.mp4 40MB 21 Password Cracking/002 John The Ripper.mp4 40MB 24 Attacking Active Directory (Realistic Scenario)/002 Exploitation.mp4 39MB 11 VPNs/002 What is IPSEC_.mp4 38MB 15 Python Course/017 Error Handling.mp4 38MB 19 Exploitation/013 Insecure Direct Object Reference.mp4 37MB 05 The Linux Operating System/015 Symbolic Links.mp4 37MB 20 Post Exploitation/018 Pass The Hash.mp4 37MB 07 Active Directory/001 What is Active Directory.mp4 36MB 10 Networking/001 What is Networking_.mp4 35MB 08 Kerberos/004 The Ticket Granting Server.mp4 35MB 03 Penetration Testing Process/002 Penetration Testing Methodology.mp4 34MB 21 Password Cracking/004 Rainbow Tables.mp4 33MB 15 Python Course/008 Loops.mp4 33MB 15 Python Course/004 Variables.mp4 33MB 17 Scope Identification/002 Stability Considerations.mp4 32MB 25 Job Hunting/010 The Interview Process - The Screening Call.mp4 32MB 04 The Windows Operating System/009 Windows Internals - The SID.mp4 32MB 07 Active Directory/006 Managing Users and Groups.mp4 32MB 24 Attacking Active Directory (Realistic Scenario)/001 Reconnaissance.mp4 31MB 05 The Linux Operating System/019 Linux Logs.mp4 31MB 10 Networking/006 Routers & Gateways.mp4 30MB 05 The Linux Operating System/003 Linux Command Line - Navigation.mp4 30MB 18 Reconnaissance/018 Reconnaissance Hands On.mp4 30MB 20 Post Exploitation/025 Account Directory Attacks.mp4 30MB 03 Penetration Testing Process/008 Routine Assessments Part 5 - Constant Assessments_.mp4 30MB 05 The Linux Operating System/005 Linux Command Line - Standard I_O_E Recap.mp4 30MB 11 VPNs/003 What is IKE_.mp4 29MB 10 Networking/010 DHCP.mp4 29MB 05 The Linux Operating System/013 What are INodes_.mp4 28MB 10 Networking/008 ICMP.mp4 28MB 01 Welcome! Who Is This Guy_!/001 Introduction.mp4 27MB 15 Python Course/012 Modules.mp4 27MB 17 Scope Identification/001 Goal & Scope Identification.mp4 27MB 06 Operating System Internals/007 The Stack.mp4 26MB 06 Operating System Internals/002 One Ring to Rule Them All.mp4 26MB 05 The Linux Operating System/009 Linux Command Line - Base64.mp4 26MB 02 The 3 Teams/004 The Purple Team.mp4 26MB 03 Penetration Testing Process/005 Routine Assessments Part 2 - Yearly Assessments.mp4 26MB 05 The Linux Operating System/016 The ID's.mp4 26MB 15 Python Course/016 Logging.mp4 25MB 10 Networking/011 ARP.mp4 25MB 10 Networking/013 What is an IPS.mp4 25MB 25 Job Hunting/014 The Interview Process - The Onsite.mp4 24MB 18 Reconnaissance/015 Active Recon - Vulnerability Scanners.mp4 24MB 02 The 3 Teams/003 The Blue Team.mp4 24MB 23 Reporting/003 Business Risks on Findings.mp4 24MB 05 The Linux Operating System/008 Linux Command Line - Man Pages.mp4 23MB 10 Networking/017 Quick Talk on Databases.mp4 23MB 20 Post Exploitation/020 Checking Logs.mp4 22MB 05 The Linux Operating System/002 The Linux File System.mp4 22MB 22 Covering Your Tracks/006 Persistent Backdoors.mp4 22MB 10 Networking/005 The Switch.mp4 22MB 21 Password Cracking/001 What is Password Cracking_.mp4 22MB 09 Data Manipulation/010 Base64 Encoding.mp4 21MB 09 Data Manipulation/003 Asymmetric Encryption.mp4 21MB 10 Networking/014 What is HA_.mp4 21MB 10 Networking/002 The OSI Model.mp4 21MB 06 Operating System Internals/012 A Quick Word About AntiVirus.mp4 20MB 09 Data Manipulation/011 Hex Encoding.mp4 20MB 15 Python Course/015 Configuration Files.mp4 20MB 06 Operating System Internals/009 Extra information on Memory.mp4 20MB 14 Program Theory/002 What is a Linker_.mp4 19MB 19 Exploitation/003 Looking for 0 days.mp4 19MB 15 Python Course/005 Type Casting.mp4 19MB 17 Scope Identification/004 Prepping.mp4 19MB 25 Job Hunting/013 The Interview Process - Prepping for the On Site Final Interview.mp4 19MB 22 Covering Your Tracks/001 Why Cover Your Tracks_.mp4 18MB 03 Penetration Testing Process/007 Routine Assessments Part 4- Monthly Assessments_.mp4 18MB 05 The Linux Operating System/018 Linux Run Levels.mp4 18MB 09 Data Manipulation/008 SHA Hashing.mp4 18MB 03 Penetration Testing Process/004 Routine Assessments Part 1 - What Are Routine Assessments_.mp4 18MB 14 Program Theory/001 What is a Compiler_.mp4 18MB 20 Post Exploitation/024 Web Servers.mp4 18MB 09 Data Manipulation/014 Lossless vs Lossy Compression.mp4 17MB 03 Penetration Testing Process/011 Specialties_!.mp4 17MB 19 Exploitation/002 Misconfigurations.mp4 17MB 05 The Linux Operating System/001 Where is the GUI_!.mp4 17MB 08 Kerberos/001 What is Kerberos_.mp4 17MB 12 Firewalls/001 What is a Firewall_.mp4 17MB 15 Python Course/001 Why Python_.mp4 16MB 09 Data Manipulation/002 Symmetric Encryption.mp4 16MB 15 Python Course/011 Tuples.mp4 16MB 10 Networking/012 What is an IDS.mp4 16MB 18 Reconnaissance/001 What is Reconnaissance_.mp4 16MB 23 Reporting/002 The Audience.mp4 16MB 20 Post Exploitation/021 Duel Homed Machines.mp4 16MB 15 Python Course/006 Operators.mp4 16MB 08 Kerberos/003 The Authentication Server.mp4 15MB 06 Operating System Internals/006 What is Memory & How does it work_.mp4 15MB 19 Exploitation/018 Faulty Redirects.mp4 15MB 06 Operating System Internals/008 The Heap.mp4 15MB 16 Assembly Course/011 Bit Operators.mp4 15MB 09 Data Manipulation/001 What is Encryption.mp4 15MB 09 Data Manipulation/012 URL Encoding.mp4 14MB 19 Exploitation/009 Metasploit - Hands On.mp4 14MB 03 Penetration Testing Process/012 The CIA Triangle.mp4 14MB 03 Penetration Testing Process/001 Module Overview - Penetration Testing Process.mp4 14MB 10 Networking/015 Proxys.mp4 13MB 23 Reporting/004 Remediation Options.mp4 13MB 09 Data Manipulation/013 What is Compression_.mp4 13MB 10 Networking/016 The DMZ.mp4 12MB 25 Job Hunting/002 Professional Email.mp4 12MB 06 Operating System Internals/011 Taking a look at ASLR.mp4 12MB 12 Firewalls/003 Stateful Inspecting Firewalls.mp4 12MB 09 Data Manipulation/006 What is Hashing_.mp4 11MB 15 Python Course/020 Python Hands On.mp4 11MB 17 Scope Identification/003 Briefing Stake Holders.mp4 11MB 20 Post Exploitation/003 What is Persistence_.mp4 11MB 10 Networking/004 UDP.mp4 11MB 06 Operating System Internals/005 The CPU Flags.mp4 11MB 11 VPNs/001 What is a VPN.mp4 10MB 09 Data Manipulation/007 MD5 Hashing.mp4 10MB 06 Operating System Internals/003 What is a CPU_.mp4 10MB 09 Data Manipulation/015 LZ77 & LZ78 Compression Algorithms.mp4 10MB 23 Reporting/005 Working With The Blue Team.mp4 10MB 09 Data Manipulation/004 RSA Encryption.mp4 9MB 17 Scope Identification/005 Scope Identification Hands On.mp4 9MB 12 Firewalls/004 Web Application Firewalls.mp4 9MB 13 Configuring PFSense Firewalls/006 PFsense Hands On.mp4 9MB 08 Kerberos/002 Kerberos Realms.mp4 9MB 09 Data Manipulation/009 What is Encoding_.mp4 9MB 16 Assembly Course/001 Why Assembly_.mp4 8MB 09 Data Manipulation/016 Data Manipulation - Hands On.mp4 8MB 09 Data Manipulation/005 AES Encryption.mp4 8MB 25 Job Hunting/016 Congratulations!.mp4 8MB 21 Password Cracking/005 Password Cracking Hands On.mp4 6MB 10 Networking/007 What is a Protocol_.mp4 6MB 16 Assembly Course/012 Assembly Hands On.mp4 6MB 12 Firewalls/002 Packet Filtering Firewalls.mp4 5MB 02 The 3 Teams/001 Module Overview - The 3 Teams.mp4 4MB 22 Covering Your Tracks/008 Covering Your Tracks Hands On.mp4 3MB 06 Operating System Internals/064 Debugger.pptx 445KB 10 Networking/100 The Switch.pptx 405KB 04 The Windows Operating System/022 Windows UAC.pptx 164KB 04 The Windows Operating System/026 SID.pptx 136KB 05 The Linux Operating System/042 Linux File Permissions.pptx 134KB 06 Operating System Internals/055 The Kernel.pptx 120KB 06 Operating System Internals/058 Registers.pptx 120KB 04 The Windows Operating System/029 PE Files and DLLs.pptx 118KB 05 The Linux Operating System/047 Processes.pptx 117KB 23 Reporting/242 Report Template.docx 112KB 09 Data Manipulation/089 Base64.pptx 110KB 05 The Linux Operating System/049 Open FIles.pptx 108KB 05 The Linux Operating System/037 The Linux File System.pptx 108KB 10 Networking/096 What is Networking.pptx 108KB 03 Penetration Testing Process/007 Penetration Testing Methodology.pptx 106KB 10 Networking/097 OSI Model.pptx 103KB 05 The Linux Operating System/050 Symbolic Links.pptx 103KB 06 Operating System Internals/056 One Ring to Rule Them All.pptx 102KB 08 Kerberos/079 The Ticket Granting Server.pptx 102KB 11 VPNs/114 What is a IPSEC.pptx 102KB 04 The Windows Operating System/027 Tokens.pptx 102KB 04 The Windows Operating System/020 The Windows File System.pptx 102KB 06 Operating System Internals/066 AntiVirus.pptx 102KB 06 Operating System Internals/063 More on Memory.pptx 102KB 09 Data Manipulation/082 Asymmetric Encryption.pptx 101KB 06 Operating System Internals/065 ASLR.pptx 101KB 11 VPNs/115 What is a IKE.pptx 101KB 03 Penetration Testing Process/006 Penetration Testing Process - Module Overview.pptx 101KB 10 Networking/105 DHCP.pptx 100KB 19 Exploitation/199 Broken Auth.pptx 100KB 10 Networking/098 TCPIP.pptx 100KB 04 The Windows Operating System/028 Windows Pipes.pptx 100KB 05 The Linux Operating System/053 Run Levels.pptx 100KB 05 The Linux Operating System/048 Inodes.pptx 100KB 21 Password Cracking/232 Rainbow Tables.pptx 99KB 03 Penetration Testing Process/011 Quarterly Assessments.pptx 99KB 10 Networking/104 DNS.pptx 99KB 21 Password Cracking/229 What is Password Cracking.pptx 99KB 03 Penetration Testing Process/017 CIA Triangle.pptx 99KB 06 Operating System Internals/061 The Stack.pptx 99KB 03 Penetration Testing Process/016 Specialties.pptx 98KB 06 Operating System Internals/057 What is a CPU.pptx 98KB 16 Assembly Course/158 Bit Operators.pptx 98KB 03 Penetration Testing Process/013 Constant Assessments.pptx 98KB 02 The 3 Teams/004 The Blue Team.pptx 97KB 02 The 3 Teams/003 The Red Team.pptx 97KB 17 Scope Identification/160 Goal and Scope Identification.pptx 97KB 25 Job Hunting/267 The Offer.pptx 97KB 08 Kerberos/078 The Authentication Sever.pptx 97KB 23 Reporting/244 Buisness Risk on Findings.pptx 97KB 02 The 3 Teams/005 The Purple Team.pptx 97KB 09 Data Manipulation/081 Symmetric Encryption.pptx 97KB 22 Covering Your Tracks/234 Why Cover Your Tracks.pptx 97KB 06 Operating System Internals/059 Flags.pptx 96KB 09 Data Manipulation/092 What is Compression.pptx 96KB 03 Penetration Testing Process/010 Yearly Assessments.pptx 96KB 06 Operating System Internals/060 Memory.pptx 96KB 03 Penetration Testing Process/012 Monthly Assessments.pptx 96KB 23 Reporting/243 The Audience.pptx 96KB 12 Firewalls/116 What is a Firewall.pptx 96KB 14 Program Theory/126 What is a Compiler.pptx 96KB 10 Networking/112 Quick Talk on Databases.pptx 96KB 10 Networking/103 ICMP.pptx 96KB 10 Networking/106 ARP.pptx 96KB 10 Networking/108 What is an IPS.pptx 96KB 17 Scope Identification/161 Stability Considerations.pptx 96KB 09 Data Manipulation/090 Hex.pptx 96KB 10 Networking/107 What is an IDS.pptx 96KB 08 Kerberos/076 What is Kerberos.pptx 96KB 18 Reconnaissance/179 Vuln Scanners.pptx 95KB 10 Networking/101 Routers and Gateways.pptx 95KB 05 The Linux Operating System/036 The GUI.pptx 95KB 20 Post Exploitation/203 What is Persistence.pptx 95KB 06 Operating System Internals/062 The Heap.pptx 95KB 07 Active Directory/067 What is Active Directory.pptx 95KB 25 Job Hunting/262 The Screening Call.pptx 95KB 19 Exploitation/184 Misconfigurations.pptx 95KB 25 Job Hunting/265 Prepping for the on site Interview.pptx 95KB 04 The Windows Operating System/025 API Calls.pptx 95KB 12 Firewalls/118 Stateful Inspection Firewalls.pptx 95KB 03 Penetration Testing Process/009 What Are Routine Assessments.pptx 95KB 09 Data Manipulation/080 What is Encryption.pptx 95KB 09 Data Manipulation/088 What is Encoding.pptx 94KB 09 Data Manipulation/091 URL.pptx 94KB 08 Kerberos/077 Kerberos Realm.pptx 94KB 09 Data Manipulation/085 What is Hashing.pptx 94KB 14 Program Theory/127 What is a Linker.pptx 94KB 12 Firewalls/117 Packet Filtering Firewalls.pptx 94KB 10 Networking/109 What is HA.pptx 94KB 17 Scope Identification/162 Briefing Stake Holders.pptx 94KB 09 Data Manipulation/093 Lossless vs Lossy.pptx 94KB 15 Python Course/147 Hands On Python.pptx 94KB 25 Job Hunting/266 Onsite Interview.pptx 94KB 18 Reconnaissance/165 What is Recon.pptx 93KB 09 Data Manipulation/094 LZ77 and LZ78.pptx 93KB 17 Scope Identification/164 Scope Identification Hands On.pptx 93KB 21 Password Cracking/233 Password Cracking Hands On.pptx 93KB 23 Reporting/246 Working With The Blue Team.pptx 93KB 12 Firewalls/119 Web Application Firewalls.pptx 93KB 10 Networking/110 Proxys.pptx 93KB 19 Exploitation/185 0Days.pptx 93KB 09 Data Manipulation/083 RSA.pptx 93KB 09 Data Manipulation/087 SHA.pptx 93KB 16 Assembly Course/148 Why ASM.pptx 93KB 09 Data Manipulation/084 AES.pptx 93KB 09 Data Manipulation/086 MD5.pptx 93KB 11 VPNs/113 What is a VPN.pptx 93KB 19 Exploitation/191 Metasploit Hands On.pptx 93KB 23 Reporting/245 Remediation Options.pptx 92KB 13 Configuring PFSense Firewalls/125 PFSense Hands On.pptx 92KB 16 Assembly Course/159 Assembly Hands On.pptx 92KB 02 The 3 Teams/002 The 3 Teams.pptx 92KB 10 Networking/102 What is a Protocol.pptx 92KB 09 Data Manipulation/095 Data Manipulation Hands On.pptx 91KB 15 Python Course/128 Why Python.pptx 91KB 10 Networking/111 DMZ.pptx 91KB 10 Networking/099 UDP.pptx 91KB 19 Exploitation/011 SQL Injection & SQLMap.en.srt 43KB 25 Job Hunting/006 Analyzing the Job Post.en.srt 39KB 03 Penetration Testing Process/008 Metrics.xlsx 37KB 17 Scope Identification/163 Assessment Document Template.docx 34KB 04 The Windows Operating System/002 Windows at a Glance.en.srt 31KB 18 Reconnaissance/008 Active Recon - Port Scanning.en.srt 31KB 03 Penetration Testing Process/015 Budget Sample.xlsx 28KB 16 Assembly Course/005 Arithmetic.en.srt 26KB 03 Penetration Testing Process/014 Assessment Template.xlsx 24KB 03 Penetration Testing Process/015 Budget Template.xlsx 24KB 19 Exploitation/005 Metasploit - Exploits and Payloads.en.srt 24KB 16 Assembly Course/002 Hello World.en.srt 24KB 04 The Windows Operating System/012 Windows Internals - PE Files & DLLs.en.srt 23KB 23 Reporting/001 The Format.en.srt 23KB 04 The Windows Operating System/006 Windows Internals - Permissions.en.srt 23KB 19 Exploitation/012 XSS.en.srt 20KB 20 Post Exploitation/013 Unquoted Service Path.en.srt 20KB 19 Exploitation/006 Metasploit - The Meterpreter.en.srt 20KB 05 The Linux Operating System/006 Linux Command Line - Working with Data.en.srt 20KB 20 Post Exploitation/009 File Permissions.en.srt 20KB 20 Post Exploitation/028 Pivoting.en.srt 20KB 20 Post Exploitation/001 Stabilizing Shells.en.srt 20KB 15 Python Course/014 Inheritance.en.srt 20KB 25 Job Hunting/003 Certifications.en.srt 20KB 25 Job Hunting/004 Personal Brand.en.srt 19KB 25 Job Hunting/005 Searching for the Job.en.srt 19KB 25 Job Hunting/253 Resume.docx 19KB 20 Post Exploitation/010 MySQL.en.srt 19KB 04 The Windows Operating System/018 Windows Command Line - Managing Windows.en.srt 19KB 25 Job Hunting/012 The Interview Process - The Technical Screening Interview.en.srt 19KB 03 Penetration Testing Process/010 Building & Working with an Enterprise Budget.en.srt 19KB 05 The Linux Operating System/012 Linux Processes.en.srt 18KB 18 Reconnaissance/013 Active Recon - Working with NC.en.srt 18KB 07 Active Directory/008 Setting up Group Policies.en.srt 18KB 25 Job Hunting/015 The Interview Process - The Offer.en.srt 18KB 25 Job Hunting/009 Salary Requirements.en.srt 17KB 04 The Windows Operating System/003 The Windows File System.en.srt 17KB 15 Python Course/007 If_Else.en.srt 17KB 03 Penetration Testing Process/003 Metrics & Why They Are Important.en.srt 17KB 19 Exploitation/014 Local File Inclusion.en.srt 17KB 20 Post Exploitation/027 SSH Tunneling.en.srt 17KB 04 The Windows Operating System/008 Windows Internals - API Calls.en.srt 17KB 16 Assembly Course/008 Reading Files.en.srt 16KB 20 Post Exploitation/008 Common Configuration Issues.en.srt 16KB 06 Operating System Internals/001 The Kernel.en.srt 16KB 04 The Windows Operating System/004 Windows Logs.en.srt 16KB 15 Python Course/013 Classes.en.srt 16KB 20 Post Exploitation/005 Linux Persistence.en.srt 16KB 15 Python Course/018 Sockets.en.srt 15KB 25 Job Hunting/011 The Interview Process - Prepping for the Technical Interviews.en.srt 15KB 19 Exploitation/007 Metasploit - Adding an Exploit to Metasploit.en.srt 15KB 16 Assembly Course/004 Saving States.en.srt 15KB 20 Post Exploitation/017 Pulling Hashes.en.srt 15KB 20 Post Exploitation/007 OS Version.en.srt 15KB 19 Exploitation/001 Finding Exploits.en.srt 15KB 16 Assembly Course/007 Logic Control.en.srt 14KB 10 Networking/003 TCP_IP.en.srt 14KB 13 Configuring PFSense Firewalls/002 The Firewall UI.en.srt 14KB 15 Python Course/010 Lists.en.srt 14KB 07 Active Directory/004 The AD Tree.en.srt 14KB 05 The Linux Operating System/007 Linux Command Line - Working with File Permissions.en.srt 14KB 25 Job Hunting/008 The Future Company.en.srt 14KB 04 The Windows Operating System/001 Installing & Using VirtualBox for Lab Virtualization.en.srt 14KB 20 Post Exploitation/004 Windows Persistence.en.srt 14KB 03 Penetration Testing Process/006 Routine Assessments Part 3 - Quarterly Assessments_.en.srt 14KB 07 Active Directory/003 Install AD DS.en.srt 14KB 18 Reconnaissance/003 Passive Recon - Google.en.srt 14KB 25 Job Hunting/010 The Interview Process - The Screening Call.en.srt 14KB 05 The Linux Operating System/004 Linux Command Line - Working with Files and Directories.en.srt 13KB 18 Reconnaissance/012 Active Recon - Sparta.en.srt 13KB 11 VPNs/002 What is IPSEC_.en.srt 13KB 03 Penetration Testing Process/002 Penetration Testing Methodology.en.srt 13KB 02 The 3 Teams/002 The Red Team.en.srt 13KB 15 Python Course/009 The Dictionary.en.srt 13KB 03 Penetration Testing Process/008 Routine Assessments Part 5 - Constant Assessments_.en.srt 13KB 22 Covering Your Tracks/005 Clearing Command History.en.srt 13KB 19 Exploitation/017 Broken Authentication and Session Management.en.srt 12KB 04 The Windows Operating System/016 Windows Command Line - Working with Pipes.en.srt 12KB 20 Post Exploitation/011 Sudo.en.srt 12KB 25 Job Hunting/001 The Resume.en.srt 12KB 10 Networking/001 What is Networking_.en.srt 12KB 18 Reconnaissance/007 Passive Recon - Job Posting.en.srt 12KB 06 Operating System Internals/004 The CPU Registers.en.srt 12KB 04 The Windows Operating System/005 Windows Internals - UAC.en.srt 12KB 19 Exploitation/004 Metasploit - What is Metasploit_.en.srt 12KB 10 Networking/009 DNS.en.srt 12KB 13 Configuring PFSense Firewalls/003 Configuring a DMZ.en.srt 12KB 19 Exploitation/010 The OWASP Top 10.en.srt 12KB 17 Scope Identification/002 Stability Considerations.en.srt 12KB 15 Python Course/008 Loops.en.srt 12KB 20 Post Exploitation/002 Breaking Out Of The Jail Shell.en.srt 12KB 18 Reconnaissance/014 Active Recon - Banner Grabbing.en.srt 12KB 19 Exploitation/008 Metasploit - MSFVenom.en.srt 12KB 20 Post Exploitation/022 Network Traffic.en.srt 11KB 18 Reconnaissance/009 Active Recon - DNS.en.srt 11KB 13 Configuring PFSense Firewalls/001 Installing PFSense.en.srt 11KB 19 Exploitation/015 Remote File Inclusion.en.srt 11KB 04 The Windows Operating System/010 Windows Internals - Tokens.en.srt 11KB 24 Attacking Active Directory (Realistic Scenario)/006 Getting Domain Admin.en.srt 11KB 18 Reconnaissance/006 Passive Recon - Netcraft.en.srt 11KB 15 Python Course/019 Threading.en.srt 11KB 25 Job Hunting/014 The Interview Process - The Onsite.en.srt 11KB 20 Post Exploitation/012 Relative Path Sudo Binary.en.srt 11KB 03 Penetration Testing Process/009 Routine Assessments Part 6 - Building an Assessment Plan.en.srt 11KB 04 The Windows Operating System/015 Windows Command Line - Working with Files and Directories.en.srt 11KB 20 Post Exploitation/015 LinuxPrivChecker.en.srt 11KB 13 Configuring PFSense Firewalls/004 Configuring a VPN.en.srt 10KB 18 Reconnaissance/005 Passive Recon - Whois.en.srt 10KB 02 The 3 Teams/004 The Purple Team.en.srt 10KB 04 The Windows Operating System/007 Windows Internals - Alternate Data Streams.en.srt 10KB 15 Python Course/017 Error Handling.en.srt 10KB 20 Post Exploitation/023 ARP Poisoning.en.srt 10KB 07 Active Directory/002 Basic Windows Server Configuration.en.srt 10KB 20 Post Exploitation/014 Service Misconfigurations.en.srt 10KB 11 VPNs/003 What is IKE_.en.srt 10KB 15 Python Course/016 Logging.en.srt 10KB 08 Kerberos/004 The Ticket Granting Server.en.srt 10KB 17 Scope Identification/001 Goal & Scope Identification.en.srt 10KB 18 Reconnaissance/016 Active Recon - Browsing.en.srt 10KB 04 The Windows Operating System/014 Windows Command Line - Navigation.en.srt 10KB 15 Python Course/003 Hello World.en.srt 10KB 24 Attacking Active Directory (Realistic Scenario)/004 Finding New Access.en.srt 10KB 21 Password Cracking/003 Hashcat.en.srt 9KB 07 Active Directory/007 Adding Machine to the Domain.en.srt 9KB 15 Python Course/004 Variables.en.srt 9KB 05 The Linux Operating System/014 Working with Open Files.en.srt 9KB 18 Reconnaissance/002 Installing Kali.en.srt 9KB 04 The Windows Operating System/009 Windows Internals - The SID.en.srt 9KB 16 Assembly Course/009 Writing Files.en.srt 9KB 10 Networking/006 Routers & Gateways.en.srt 9KB 20 Post Exploitation/026 Password Spraying.en.srt 9KB 15 Python Course/012 Modules.en.srt 9KB 18 Reconnaissance/010 Active Recon - Nikto.en.srt 9KB 23 Reporting/003 Business Risks on Findings.en.srt 9KB 16 Assembly Course/010 Op Code.en.srt 9KB 10 Networking/008 ICMP.en.srt 9KB 10 Networking/010 DHCP.en.srt 9KB 07 Active Directory/005 OU's and their Permissions.en.srt 9KB 05 The Linux Operating System/015 Symbolic Links.en.srt 9KB 19 Exploitation/013 Insecure Direct Object Reference.en.srt 9KB 06 Operating System Internals/007 The Stack.en.srt 8KB 07 Active Directory/001 What is Active Directory.en.srt 8KB 18 Reconnaissance/004 Passive Recon - Shodan.en.srt 8KB 22 Covering Your Tracks/003 Clearing Linux Logs.en.srt 8KB 05 The Linux Operating System/002 The Linux File System.en.srt 8KB 06 Operating System Internals/002 One Ring to Rule Them All.en.srt 8KB 10 Networking/002 The OSI Model.en.srt 8KB 22 Covering Your Tracks/004 Quick Talk on Logging.en.srt 8KB 03 Penetration Testing Process/005 Routine Assessments Part 2 - Yearly Assessments.en.srt 8KB 04 The Windows Operating System/011 Windows Internals - Named Pipes.en.srt 8KB 25 Job Hunting/013 The Interview Process - Prepping for the On Site Final Interview.en.srt 8KB 05 The Linux Operating System/010 Linux Command Line - Hex.en.srt 8KB 19 Exploitation/016 The Authenticated Unauthenticated Pages.en.srt 8KB 06 Operating System Internals/012 A Quick Word About AntiVirus.en.srt 8KB 09 Data Manipulation/003 Asymmetric Encryption.en.srt 8KB 18 Reconnaissance/015 Active Recon - Vulnerability Scanners.en.srt 8KB 21 Password Cracking/004 Rainbow Tables.en.srt 8KB 06 Operating System Internals/010 Debuggers.en.srt 8KB 21 Password Cracking/002 John The Ripper.en.srt 8KB 21 Password Cracking/001 What is Password Cracking_.en.srt 7KB 16 Assembly Course/003 Variables.en.srt 7KB 18 Reconnaissance/011 Active Recon - Dirb.en.srt 7KB 02 The 3 Teams/003 The Blue Team.en.srt 7KB 25 Job Hunting/002 Professional Email.en.srt 7KB 03 Penetration Testing Process/007 Routine Assessments Part 4- Monthly Assessments_.en.srt 7KB 13 Configuring PFSense Firewalls/005 Backup & Logging.en.srt 7KB 20 Post Exploitation/019 SSH Keys.en.srt 7KB 16 Assembly Course/006 Loops.en.srt 7KB 14 Program Theory/002 What is a Linker_.en.srt 7KB 04 The Windows Operating System/013 Windows Command Line - Accessing the Command Line.en.srt 7KB 22 Covering Your Tracks/001 Why Cover Your Tracks_.en.srt 7KB 15 Python Course/005 Type Casting.en.srt 7KB 20 Post Exploitation/006 What is Privilege Escalation_.en.srt 7KB 20 Post Exploitation/018 Pass The Hash.en.srt 7KB 07 Active Directory/006 Managing Users and Groups.en.srt 7KB 10 Networking/013 What is an IPS.en.srt 7KB 10 Networking/014 What is HA_.en.srt 7KB 10 Networking/011 ARP.en.srt 7KB 09 Data Manipulation/008 SHA Hashing.en.srt 7KB 19 Exploitation/003 Looking for 0 days.en.srt 7KB 15 Python Course/015 Configuration Files.en.srt 7KB 03 Penetration Testing Process/004 Routine Assessments Part 1 - What Are Routine Assessments_.en.srt 7KB 03 Penetration Testing Process/011 Specialties_!.en.srt 6KB 23 Reporting/002 The Audience.en.srt 6KB 09 Data Manipulation/011 Hex Encoding.en.srt 6KB 12 Firewalls/001 What is a Firewall_.en.srt 6KB 10 Networking/017 Quick Talk on Databases.en.srt 6KB 09 Data Manipulation/010 Base64 Encoding.en.srt 6KB 18 Reconnaissance/017 Active Recon - Manual vs Automated.en.srt 6KB 04 The Windows Operating System/017 Windows Command Line - Standard I_O_E.en.srt 6KB 06 Operating System Internals/009 Extra information on Memory.en.srt 6KB 05 The Linux Operating System/003 Linux Command Line - Navigation.en.srt 6KB 05 The Linux Operating System/001 Where is the GUI_!.en.srt 6KB 18 Reconnaissance/001 What is Reconnaissance_.en.srt 6KB 19 Exploitation/002 Misconfigurations.en.srt 6KB 15 Python Course/002 Installing Python.en.srt 6KB 15 Python Course/006 Operators.en.srt 6KB 05 The Linux Operating System/013 What are INodes_.en.srt 6KB 10 Networking/005 The Switch.en.srt 6KB 05 The Linux Operating System/011 Linux Command Line - Network Connections Recap.en.srt 6KB 15 Python Course/001 Why Python_.en.srt 6KB 20 Post Exploitation/025 Account Directory Attacks.en.srt 6KB 19 Exploitation/018 Faulty Redirects.en.srt 6KB 14 Program Theory/001 What is a Compiler_.en.srt 6KB 24 Attacking Active Directory (Realistic Scenario)/005 Moving Up In The World!.en.srt 6KB 05 The Linux Operating System/018 Linux Run Levels.en.srt 6KB 05 The Linux Operating System/008 Linux Command Line - Man Pages.en.srt 5KB 05 The Linux Operating System/005 Linux Command Line - Standard I_O_E Recap.en.srt 5KB 08 Kerberos/001 What is Kerberos_.en.srt 5KB 10 Networking/015 Proxys.en.srt 5KB 15 Python Course/011 Tuples.en.srt 5KB 24 Attacking Active Directory (Realistic Scenario)/002 Exploitation.en.srt 5KB 10 Networking/012 What is an IDS.en.srt 5KB 23 Reporting/004 Remediation Options.en.srt 5KB 05 The Linux Operating System/019 Linux Logs.en.srt 5KB 03 Penetration Testing Process/001 Module Overview - Penetration Testing Process.en.srt 5KB 09 Data Manipulation/002 Symmetric Encryption.en.srt 5KB 06 Operating System Internals/006 What is Memory & How does it work_.en.srt 5KB 22 Covering Your Tracks/006 Persistent Backdoors.en.srt 5KB 09 Data Manipulation/001 What is Encryption.en.srt 5KB 06 Operating System Internals/008 The Heap.en.srt 5KB 22 Covering Your Tracks/002 Clearing Windows Logs.en.srt 5KB 16 Assembly Course/011 Bit Operators.en.srt 5KB 17 Scope Identification/004 Prepping.en.srt 5KB 08 Kerberos/003 The Authentication Server.en.srt 5KB 09 Data Manipulation/013 What is Compression_.en.srt 5KB 24 Attacking Active Directory (Realistic Scenario)/003 Post Exploitation.en.srt 5KB 09 Data Manipulation/006 What is Hashing_.en.srt 5KB 19 Exploitation/009 Metasploit - Hands On.en.srt 5KB 09 Data Manipulation/014 Lossless vs Lossy Compression.en.srt 5KB 20 Post Exploitation/016 Im Root Now What_.en.srt 5KB 24 Attacking Active Directory (Realistic Scenario)/001 Reconnaissance.en.srt 5KB 06 Operating System Internals/011 Taking a look at ASLR.en.srt 5KB 03 Penetration Testing Process/012 The CIA Triangle.en.srt 5KB 22 Covering Your Tracks/007 The Clean Up.en.srt 5KB 05 The Linux Operating System/017 Linux Pipes.en.srt 4KB 09 Data Manipulation/012 URL Encoding.en.srt 4KB 07 Active Directory/009 Cached Credentials.en.srt 4KB 12 Firewalls/003 Stateful Inspecting Firewalls.en.srt 4KB 05 The Linux Operating System/016 The ID's.en.srt 4KB 06 Operating System Internals/003 What is a CPU_.en.srt 4KB 15 Python Course/020 Python Hands On.en.srt 4KB 11 VPNs/001 What is a VPN.en.srt 4KB 10 Networking/016 The DMZ.en.srt 4KB 17 Scope Identification/003 Briefing Stake Holders.en.srt 4KB 09 Data Manipulation/007 MD5 Hashing.en.srt 4KB 17 Scope Identification/005 Scope Identification Hands On.en.srt 4KB 10 Networking/004 UDP.en.srt 4KB 20 Post Exploitation/024 Web Servers.en.srt 4KB 23 Reporting/005 Working With The Blue Team.en.srt 4KB 12 Firewalls/004 Web Application Firewalls.en.srt 3KB 06 Operating System Internals/005 The CPU Flags.en.srt 3KB 05 The Linux Operating System/009 Linux Command Line - Base64.en.srt 3KB 13 Configuring PFSense Firewalls/006 PFsense Hands On.en.srt 3KB 09 Data Manipulation/004 RSA Encryption.en.srt 3KB 16 Assembly Course/001 Why Assembly_.en.srt 3KB 20 Post Exploitation/021 Duel Homed Machines.en.srt 3KB 09 Data Manipulation/009 What is Encoding_.en.srt 3KB 09 Data Manipulation/015 LZ77 & LZ78 Compression Algorithms.en.srt 3KB 20 Post Exploitation/020 Checking Logs.en.srt 3KB 09 Data Manipulation/016 Data Manipulation - Hands On.en.srt 3KB 01 Welcome! Who Is This Guy_!/001 Introduction.en.srt 2KB 18 Reconnaissance/018 Reconnaissance Hands On.en.srt 2KB 09 Data Manipulation/005 AES Encryption.en.srt 2KB 08 Kerberos/002 Kerberos Realms.en.srt 2KB 15 Python Course/133 Operators.py 2KB 15 Python Course/134 IfElse.py 2KB 21 Password Cracking/005 Password Cracking Hands On.en.srt 2KB 16 Assembly Course/012 Assembly Hands On.en.srt 2KB 16 Assembly Course/152 Arithmetic.asm.zip 2KB 12 Firewalls/002 Packet Filtering Firewalls.en.srt 2KB 10 Networking/007 What is a Protocol_.en.srt 2KB 15 Python Course/136 Dictionary.py 2KB 02 The 3 Teams/001 Module Overview - The 3 Teams.en.srt 2KB 15 Python Course/141 Inheritance.py 2KB 15 Python Course/142 Configs.zip 2KB 16 Assembly Course/153 Loops.asm.zip 2KB 15 Python Course/137 Lists.py 2KB 16 Assembly Course/155 ReadingFiles.asm.zip 2KB 22 Covering Your Tracks/008 Covering Your Tracks Hands On.en.srt 1KB 16 Assembly Course/156 WritingFiles.asm.zip 1KB 15 Python Course/143 Logging.py 1KB 16 Assembly Course/151 SavingState.asm.zip 1KB 15 Python Course/140 Classes.py 1KB 15 Python Course/135 Loops.py 1KB 15 Python Course/144 ErrorHandling.py 1KB 15 Python Course/142 Configs.py 1KB 16 Assembly Course/154 Logic.asm.zip 1KB 16 Assembly Course/149 HelloWorld.asm.zip 1KB 15 Python Course/131 Variables.py 1KB 15 Python Course/145 SocketsServer.py 1KB 15 Python Course/138 Tuples.py 1KB 16 Assembly Course/150 DataTypes.asm.zip 1KB 04 The Windows Operating System/external-assets-links.txt 1KB 15 Python Course/132 TypeCasting.py 1015B 15 Python Course/141 Account.py 961B 15 Python Course/145 SocketsClient.py 929B 15 Python Course/140 Person.py 878B 15 Python Course/146 Threading.py 845B 20 Post Exploitation/226 spray.py 831B 15 Python Course/141 CheckingAccount.py 822B 20 Post Exploitation/external-assets-links.txt 822B 15 Python Course/139 Modules.py 810B 25 Job Hunting/016 Congratulations!.en.srt 682B 18 Reconnaissance/external-assets-links.txt 662B 15 Python Course/130 HelloWorld.py 583B 09 Data Manipulation/external-assets-links.txt 544B 19 Exploitation/195 idor.txt 496B 19 Exploitation/external-assets-links.txt 494B 21 Password Cracking/external-assets-links.txt 257B 05 The Linux Operating System/external-assets-links.txt 209B 06 Operating System Internals/external-assets-links.txt 136B 15 Python Course/external-assets-links.txt 109B 01 Welcome! Who Is This Guy_!/external-assets-links.txt 95B 07 Active Directory/external-assets-links.txt 86B 13 Configuring PFSense Firewalls/external-assets-links.txt 60B 10 Networking/external-assets-links.txt 57B