01 Preparation - Creating a Penetration Testing Lab/002 The-Lab.pdf 347KB
18 Post Exploitation/085 Post-Exploitation.pdf 168KB
04 Information Gathering/011 Information-Gathering.pdf 112KB
16 Brute Force Dictionary Attacks/082 Launching a Wordlist Attack Guessing Login Password Using Hydra-en.srt 17KB
16 Brute Force Dictionary Attacks/082 Launching a Wordlist Attack Guessing Login Password Using Hydra-pt.srt 17KB
02 Preparation - Linux Basics/007 The Linux Terminal Basic Linux Commands-pt.srt 14KB
02 Preparation - Linux Basics/007 The Linux Terminal Basic Linux Commands-en.srt 14KB
07 Local File Inclusion Vulnerabilities (LFI)/031 Gaining Shell Access From LFI Vulnerabilities - Method 2-en.srt 14KB
07 Local File Inclusion Vulnerabilities (LFI)/031 Gaining Shell Access From LFI Vulnerabilities - Method 2-pt.srt 14KB
14 XSS Vulnerabilities - Exploitation/070 Bonus - Generating An Undetectable Backdoor Using Veil 3-en.srt 13KB
15 Insecure Session Management/079 Security The Right Way To Prevent CSRF Vulnerabilities-en.srt 13KB
14 XSS Vulnerabilities - Exploitation/070 Bonus - Generating An Undetectable Backdoor Using Veil 3-pt.srt 13KB
15 Insecure Session Management/079 Security The Right Way To Prevent CSRF Vulnerabilities-pt.srt 13KB
01 Preparation - Creating a Penetration Testing Lab/003 Installing Kali E8 As a Virtual Machine Using a Ready Image-en.srt 12KB
01 Preparation - Creating a Penetration Testing Lab/003 Installing Kali E8 As a Virtual Machine Using a Ready Image-pt.srt 12KB
18 Post Exploitation/093 Accessing The Database-pt.srt 12KB
18 Post Exploitation/093 Accessing The Database-en.srt 11KB
12 SQL injection Vulnerabilities - Advanced Exploitation/053 Getting A Reverse Shell Access Gaining Full Control Over The Target Web Server-pt.srt 11KB
12 SQL injection Vulnerabilities - Advanced Exploitation/053 Getting A Reverse Shell Access Gaining Full Control Over The Target Web Server-en.srt 11KB