[GigaCourse.com] Udemy - Practical Ethical Hacking - The Complete Course - TorrentBank

File Name:[GigaCourse.com] Udemy - Practical Ethical Hacking - The Complete Course

Create Tool:

Create Time:1970-01-01 08:00:00

File Size:12.05 GB

File Count:455

File Hash:27cbd76d8ac2781dc9bf104c219a0ad8aad0678c

Magnet Link:

Magnet Link:

Torrent File:

1. Course Resources/1. Course Resources.html 537 B
1. Course Resources/1.1 Course FAQ - External Option.html 124 B
1. Course Resources/1.1 Practical Ethical Hacking - FAQ.pdf 163.38 KB
1. Course Resources/1.2 Course FAQ - External Option.html 124 B
1. Course Resources/1.2 Practical Ethical Hacking - FAQ.pdf 163.38 KB
10. Scanning & Enumeration/1. Installing Kioptrix Level 1.mp4 44.84 MB
10. Scanning & Enumeration/1. Installing Kioptrix Level 1.srt 10.04 KB
10. Scanning & Enumeration/2. Scanning with Nmap.mp4 133.24 MB
10. Scanning & Enumeration/2. Scanning with Nmap.srt 29.48 KB
10. Scanning & Enumeration/3. Enumerating HTTPHTTPS - Part 1.mp4 111.19 MB
10. Scanning & Enumeration/3. Enumerating HTTPHTTPS - Part 1.srt 20.99 KB
10. Scanning & Enumeration/4. Enumerating HTTPHTTPS - Part 2.mp4 150.59 MB
10. Scanning & Enumeration/4. Enumerating HTTPHTTPS - Part 2.srt 21.53 KB
10. Scanning & Enumeration/5. Enumerating SMB.mp4 90.28 MB
10. Scanning & Enumeration/5. Enumerating SMB.srt 21.61 KB
10. Scanning & Enumeration/6. Enumerating SSH.mp4 31.12 MB
10. Scanning & Enumeration/6. Enumerating SSH.srt 5.50 KB
10. Scanning & Enumeration/7. Researching Potential Vulnerabilities.mp4 138.56 MB
10. Scanning & Enumeration/7. Researching Potential Vulnerabilities.srt 21.35 KB
10. Scanning & Enumeration/8. Our Notes, so Far.mp4 16.13 MB
10. Scanning & Enumeration/8. Our Notes, so Far.srt 4.81 KB
11. Additional Scanning Tools/1. Scanning with Masscan.mp4 26.46 MB
11. Additional Scanning Tools/1. Scanning with Masscan.srt 8.94 KB
11. Additional Scanning Tools/2. Scanning with Metasploit.mp4 22.68 MB
11. Additional Scanning Tools/2. Scanning with Metasploit.srt 4.20 KB
11. Additional Scanning Tools/3. Scanning with Nessus - Part 1.mp4 98.95 MB
11. Additional Scanning Tools/3. Scanning with Nessus - Part 1.srt 16.26 KB
11. Additional Scanning Tools/4. Scanning with Nessus - Part 2.mp4 50.58 MB
11. Additional Scanning Tools/4. Scanning with Nessus - Part 2.srt 9.41 KB
12. Exploitation Basics/1. Reverse Shells vs Bind Shells.mp4 37.04 MB
12. Exploitation Basics/1. Reverse Shells vs Bind Shells.srt 10.20 KB
12. Exploitation Basics/2. Staged vs Non-Staged Payloads.mp4 12.64 MB
12. Exploitation Basics/2. Staged vs Non-Staged Payloads.srt 4.41 KB
12. Exploitation Basics/3. Gaining Root with Metasploit.mp4 54.15 MB
12. Exploitation Basics/3. Gaining Root with Metasploit.srt 11.47 KB
12. Exploitation Basics/4. Manual Exploitation.mp4 136.32 MB
12. Exploitation Basics/4. Manual Exploitation.srt 17.09 KB
12. Exploitation Basics/5. Brute Force Attacks.mp4 93.16 MB
12. Exploitation Basics/5. Brute Force Attacks.srt 9.46 KB
12. Exploitation Basics/6. Password Spraying and Credential Stuffing.mp4 156.74 MB
12. Exploitation Basics/6. Password Spraying and Credential Stuffing.srt 20.21 KB
12. Exploitation Basics/7. Our Notes, Revisited.mp4 17.31 MB
12. Exploitation Basics/7. Our Notes, Revisited.srt 5.05 KB
13. Mid-Course Capstone/1. Introduction.mp4 75.90 MB
13. Mid-Course Capstone/1. Introduction.srt 12.50 KB
13. Mid-Course Capstone/10. Walkthrough - Grandpa.mp4 163.28 MB
13. Mid-Course Capstone/10. Walkthrough - Grandpa.srt 21.03 KB
13. Mid-Course Capstone/11. Walkthrough - Netmon.mp4 233.96 MB
13. Mid-Course Capstone/11. Walkthrough - Netmon.srt 35.10 KB
13. Mid-Course Capstone/2. Walkthrough - Legacy.mp4 331.87 MB
13. Mid-Course Capstone/2. Walkthrough - Legacy.srt 48.73 KB
13. Mid-Course Capstone/3. Walkthrough - Lame.mp4 279.98 MB
13. Mid-Course Capstone/3.1 Cracking Linux Hashes with Hashcat.html 89 B
13. Mid-Course Capstone/4. Walkthrough - Blue.mp4 284.21 MB
13. Mid-Course Capstone/4. Walkthrough - Blue.srt 42.60 KB
13. Mid-Course Capstone/5. Walkthrough - Devel.mp4 246.72 MB
13. Mid-Course Capstone/5. Walkthrough - Devel.srt 39.36 KB
13. Mid-Course Capstone/6. Walkthrough - Jerry.mp4 305.37 MB
13. Mid-Course Capstone/6. Walkthrough - Jerry.srt 46.69 KB
13. Mid-Course Capstone/7. Walkthrough - Nibbles.mp4 285.38 MB
13. Mid-Course Capstone/7. Walkthrough - Nibbles.srt 43.33 KB
13. Mid-Course Capstone/8. Walkthrough - Optimum.mp4 235.57 MB
13. Mid-Course Capstone/8. Walkthrough - Optimum.srt 35.91 KB
13. Mid-Course Capstone/9. Walkthrough - Bashed.mp4 242.28 MB
13. Mid-Course Capstone/9. Walkthrough - Bashed.srt 41.40 KB
14. Introduction to Exploit Development (Buffer Overflows)/1. Required Installations.mp4 58.44 MB
14. Introduction to Exploit Development (Buffer Overflows)/1. Required Installations.srt 8.68 KB
14. Introduction to Exploit Development (Buffer Overflows)/2. Buffer Overflows Explained.mp4 30.15 MB
14. Introduction to Exploit Development (Buffer Overflows)/2. Buffer Overflows Explained.srt 5.95 KB
14. Introduction to Exploit Development (Buffer Overflows)/3. Spiking.mp4 60.29 MB
14. Introduction to Exploit Development (Buffer Overflows)/3. Spiking.srt 14.68 KB
14. Introduction to Exploit Development (Buffer Overflows)/4. Fuzzing.mp4 29.53 MB
14. Introduction to Exploit Development (Buffer Overflows)/4. Fuzzing.srt 9.58 KB
14. Introduction to Exploit Development (Buffer Overflows)/5. Finding the Offset.mp4 42.16 MB
14. Introduction to Exploit Development (Buffer Overflows)/5. Finding the Offset.srt 7.55 KB
14. Introduction to Exploit Development (Buffer Overflows)/6. Overwriting the EIP.mp4 16.72 MB
14. Introduction to Exploit Development (Buffer Overflows)/6. Overwriting the EIP.srt 4.50 KB
14. Introduction to Exploit Development (Buffer Overflows)/7. Finding Bad Characters.mp4 44.80 MB
14. Introduction to Exploit Development (Buffer Overflows)/7. Finding Bad Characters.srt 8.78 KB
14. Introduction to Exploit Development (Buffer Overflows)/8. Finding the Right Module.mp4 65.89 MB
14. Introduction to Exploit Development (Buffer Overflows)/8. Finding the Right Module.srt 11.33 KB
14. Introduction to Exploit Development (Buffer Overflows)/9. Generating Shellcode and Getting Root.mp4 35.12 MB
14. Introduction to Exploit Development (Buffer Overflows)/9. Generating Shellcode and Getting Root.srt 9.23 KB
15. Active Directory Overview/1. Active Directory Overview.mp4 22.56 MB
15. Active Directory Overview/1. Active Directory Overview.srt 7.66 KB
15. Active Directory Overview/2. Physical Active Directory Components.mp4 20.04 MB
15. Active Directory Overview/2. Physical Active Directory Components.srt 8.70 KB
15. Active Directory Overview/3. Logical Active Directory Components.mp4 22.86 MB
15. Active Directory Overview/3. Logical Active Directory Components.srt 10.65 KB
16. Active Directory Lab Build/1. Lab Overview and Requirements.mp4 7.65 MB
16. Active Directory Lab Build/1. Lab Overview and Requirements.srt 4.65 KB
16. Active Directory Lab Build/2. Downloading Necessary ISOs.mp4 17.83 MB
16. Active Directory Lab Build/2. Downloading Necessary ISOs.srt 4.03 KB
16. Active Directory Lab Build/3. Setting Up the Domain Controller.mp4 76.25 MB
16. Active Directory Lab Build/3. Setting Up the Domain Controller.srt 17.26 KB
16. Active Directory Lab Build/4. Setting Up the User Machines.mp4 35.70 MB
16. Active Directory Lab Build/4. Setting Up the User Machines.srt 10.96 KB
16. Active Directory Lab Build/5. Setting Up Users, Groups, and Policies.mp4 99.71 MB
16. Active Directory Lab Build/5. Setting Up Users, Groups, and Policies.srt 20.11 KB
16. Active Directory Lab Build/6. Joining Our Machines to the Domain.mp4 79.34 MB
16. Active Directory Lab Build/6. Joining Our Machines to the Domain.srt 11.60 KB
17. Attacking Active Directory Initial Attack Vectors/1. Introduction.mp4 25.66 MB
17. Attacking Active Directory Initial Attack Vectors/1. Introduction.srt 5.81 KB
17. Attacking Active Directory Initial Attack Vectors/1.1 Top Five Ways I Got Domain Admin.html 190 B
17. Attacking Active Directory Initial Attack Vectors/10. SMB Relay Attack Demonstration Part 2.mp4 29.56 MB
17. Attacking Active Directory Initial Attack Vectors/10. SMB Relay Attack Demonstration Part 2.srt 5.46 KB
17. Attacking Active Directory Initial Attack Vectors/11. SMB Relay Attack Defenses.mp4 12.69 MB
17. Attacking Active Directory Initial Attack Vectors/11. SMB Relay Attack Defenses.srt 3.65 KB
17. Attacking Active Directory Initial Attack Vectors/12. Gaining Shell Access.mp4 61.26 MB
17. Attacking Active Directory Initial Attack Vectors/12. Gaining Shell Access.srt 9.99 KB
17. Attacking Active Directory Initial Attack Vectors/13. IPv6 Attacks Overview.mp4 9.17 MB
17. Attacking Active Directory Initial Attack Vectors/13. IPv6 Attacks Overview.srt 5.57 KB
17. Attacking Active Directory Initial Attack Vectors/14. Installing mitm6.mp4 13.49 MB
17. Attacking Active Directory Initial Attack Vectors/14. Installing mitm6.srt 1.58 KB
17. Attacking Active Directory Initial Attack Vectors/15. Setting Up LDAPS.mp4 12.92 MB
17. Attacking Active Directory Initial Attack Vectors/15. Setting Up LDAPS.srt 2.78 KB
17. Attacking Active Directory Initial Attack Vectors/16. IPv6 DNS Takeover via mitm6.mp4 86.78 MB
17. Attacking Active Directory Initial Attack Vectors/16. IPv6 DNS Takeover via mitm6.srt 11.09 KB
17. Attacking Active Directory Initial Attack Vectors/16.1 The worst of both worlds Combining NTLM Relaying and Kerberos delegation.html 140 B
17. Attacking Active Directory Initial Attack Vectors/16.1 mitm6 – compromising IPv4 networks via IPv6.html 138 B
17. Attacking Active Directory Initial Attack Vectors/16.2 The worst of both worlds Combining NTLM Relaying and Kerberos delegation.html 140 B
17. Attacking Active Directory Initial Attack Vectors/16.2 mitm6 – compromising IPv4 networks via IPv6.html 138 B
17. Attacking Active Directory Initial Attack Vectors/17. IPv6 Attack Defenses.mp4 19.91 MB
17. Attacking Active Directory Initial Attack Vectors/17. IPv6 Attack Defenses.srt 4.54 KB
17. Attacking Active Directory Initial Attack Vectors/18. Other Attack Vectors and Strategies.mp4 26.96 MB
17. Attacking Active Directory Initial Attack Vectors/18. Other Attack Vectors and Strategies.srt 13.25 KB
17. Attacking Active Directory Initial Attack Vectors/2. LLMNR Poisoning Overview.mp4 45.68 MB
17. Attacking Active Directory Initial Attack Vectors/2. LLMNR Poisoning Overview.srt 10.99 KB
17. Attacking Active Directory Initial Attack Vectors/3. Capturing NTLMv2 Hashes with Responder.mp4 52.79 MB
17. Attacking Active Directory Initial Attack Vectors/3. Capturing NTLMv2 Hashes with Responder.srt 7.39 KB
17. Attacking Active Directory Initial Attack Vectors/4. Password Cracking with Hashcat.mp4 154.35 MB
17. Attacking Active Directory Initial Attack Vectors/4. Password Cracking with Hashcat.srt 16.29 KB
17. Attacking Active Directory Initial Attack Vectors/5. LLMNR Poisoning Defenses.mp4 18.29 MB
17. Attacking Active Directory Initial Attack Vectors/5. LLMNR Poisoning Defenses.srt 3.92 KB
17. Attacking Active Directory Initial Attack Vectors/6. SMB Relay Attacks Overview.mp4 26.86 MB
17. Attacking Active Directory Initial Attack Vectors/6. SMB Relay Attacks Overview.srt 7.93 KB
17. Attacking Active Directory Initial Attack Vectors/7. Quick Lab Update.mp4 9.26 MB
17. Attacking Active Directory Initial Attack Vectors/7. Quick Lab Update.srt 1.44 KB
17. Attacking Active Directory Initial Attack Vectors/8. Discovering Hosts with SMB Signing Disabled.mp4 42.19 MB
17. Attacking Active Directory Initial Attack Vectors/8. Discovering Hosts with SMB Signing Disabled.srt 4.95 KB
17. Attacking Active Directory Initial Attack Vectors/9. SMB Relay Attack Demonstration Part 1.mp4 52.10 MB
17. Attacking Active Directory Initial Attack Vectors/9. SMB Relay Attack Demonstration Part 1.srt 7.20 KB
18. Attacking Active Directory Post-Compromise Enumeration/1. Introduction.mp4 3.52 MB
18. Attacking Active Directory Post-Compromise Enumeration/1. Introduction.srt 2.94 KB
18. Attacking Active Directory Post-Compromise Enumeration/2. PowerView Overview.mp4 20.05 MB
18. Attacking Active Directory Post-Compromise Enumeration/2. PowerView Overview.srt 3.46 KB
18. Attacking Active Directory Post-Compromise Enumeration/3. Domain Enumeration with PowerView.mp4 139.48 MB
18. Attacking Active Directory Post-Compromise Enumeration/3. Domain Enumeration with PowerView.srt 22.81 KB
18. Attacking Active Directory Post-Compromise Enumeration/3.1 PowerView Cheat Sheet.html 125 B
18. Attacking Active Directory Post-Compromise Enumeration/4. Bloodhound Overview and Setup.mp4 35.91 MB
18. Attacking Active Directory Post-Compromise Enumeration/4. Bloodhound Overview and Setup.srt 5.05 KB
18. Attacking Active Directory Post-Compromise Enumeration/5. Grabbing Data with Invoke-Bloodhound.mp4 31.58 MB
18. Attacking Active Directory Post-Compromise Enumeration/5. Grabbing Data with Invoke-Bloodhound.srt 4.35 KB
18. Attacking Active Directory Post-Compromise Enumeration/6. Enumerating Domain Data with Bloodhound.mp4 34.57 MB
18. Attacking Active Directory Post-Compromise Enumeration/6. Enumerating Domain Data with Bloodhound.srt 11.53 KB
19. Attacking Active Directory Post-Compromise Attacks/1. Introduction.mp4 1.95 MB
19. Attacking Active Directory Post-Compromise Attacks/1. Introduction.srt 1.54 KB
19. Attacking Active Directory Post-Compromise Attacks/10. Token Impersonation with Incognito.mp4 48.13 MB
19. Attacking Active Directory Post-Compromise Attacks/10. Token Impersonation with Incognito.srt 9.41 KB
19. Attacking Active Directory Post-Compromise Attacks/11. Token Impersonation Mitigation.mp4 15.20 MB
19. Attacking Active Directory Post-Compromise Attacks/11. Token Impersonation Mitigation.srt 3.90 KB
19. Attacking Active Directory Post-Compromise Attacks/12. Kerberoasting Overview.mp4 25.77 MB
19. Attacking Active Directory Post-Compromise Attacks/12. Kerberoasting Overview.srt 7.55 KB
19. Attacking Active Directory Post-Compromise Attacks/13. Kerberoasting Walkthrough.mp4 43.33 MB
19. Attacking Active Directory Post-Compromise Attacks/13. Kerberoasting Walkthrough.srt 5.11 KB
19. Attacking Active Directory Post-Compromise Attacks/14. Kerberoasting Mitigation.mp4 7.43 MB
19. Attacking Active Directory Post-Compromise Attacks/14. Kerberoasting Mitigation.srt 1.63 KB
19. Attacking Active Directory Post-Compromise Attacks/15. GPP cPassword Attacks Overview.mp4 21.85 MB
19. Attacking Active Directory Post-Compromise Attacks/15. GPP cPassword Attacks Overview.srt 4.45 KB
19. Attacking Active Directory Post-Compromise Attacks/15.1 Pentesting in the Real World Group Policy Pwnage.html 145 B
19. Attacking Active Directory Post-Compromise Attacks/16. Abusing GPP Part 1.mp4 63.19 MB
19. Attacking Active Directory Post-Compromise Attacks/16. Abusing GPP Part 1.srt 12.08 KB
19. Attacking Active Directory Post-Compromise Attacks/17. Abusing GPP Part 2.mp4 41.62 MB
19. Attacking Active Directory Post-Compromise Attacks/17. Abusing GPP Part 2.srt 5.70 KB
19. Attacking Active Directory Post-Compromise Attacks/18. Mimikatz Overview.mp4 33.12 MB
19. Attacking Active Directory Post-Compromise Attacks/18. Mimikatz Overview.srt 8.43 KB
19. Attacking Active Directory Post-Compromise Attacks/18.1 Mimikatz Github.html 99 B
19. Attacking Active Directory Post-Compromise Attacks/19. Credential Dumping with Mimikatz.mp4 72.35 MB
19. Attacking Active Directory Post-Compromise Attacks/19. Credential Dumping with Mimikatz.srt 13.13 KB
19. Attacking Active Directory Post-Compromise Attacks/2. Pass the Hash Password Overview.mp4 17.89 MB
19. Attacking Active Directory Post-Compromise Attacks/2. Pass the Hash Password Overview.srt 4.66 KB
19. Attacking Active Directory Post-Compromise Attacks/20. Golden Ticket Attacks.mp4 52.35 MB
19. Attacking Active Directory Post-Compromise Attacks/20. Golden Ticket Attacks.srt 10.54 KB
19. Attacking Active Directory Post-Compromise Attacks/21. Conclusion and Additional Resources.mp4 69.98 MB
19. Attacking Active Directory Post-Compromise Attacks/21. Conclusion and Additional Resources.srt 8.66 KB
19. Attacking Active Directory Post-Compromise Attacks/21.1 Harmj0y Blog.html 85 B
19. Attacking Active Directory Post-Compromise Attacks/21.2 Pentester Academy Active Directory Labs.html 112 B
19. Attacking Active Directory Post-Compromise Attacks/21.3 eLearnSecurity PTX.html 127 B
19. Attacking Active Directory Post-Compromise Attacks/21.4 Pentester Academy Red Team Labs.html 104 B
19. Attacking Active Directory Post-Compromise Attacks/21.5 Active Directory Security Blog.html 84 B
19. Attacking Active Directory Post-Compromise Attacks/3. Installing crackmapexec.mp4 8.21 MB
19. Attacking Active Directory Post-Compromise Attacks/3. Installing crackmapexec.srt 1.09 KB
19. Attacking Active Directory Post-Compromise Attacks/4. Pass the Password Attacks.mp4 67.28 MB
19. Attacking Active Directory Post-Compromise Attacks/4. Pass the Password Attacks.srt 9.49 KB
19. Attacking Active Directory Post-Compromise Attacks/5. Dumping Hashes with secretsdump.py.mp4 24.03 MB
19. Attacking Active Directory Post-Compromise Attacks/5. Dumping Hashes with secretsdump.py.srt 4.82 KB
19. Attacking Active Directory Post-Compromise Attacks/6. Cracking NTLM Hashes with Hashcat.mp4 27.39 MB
19. Attacking Active Directory Post-Compromise Attacks/6. Cracking NTLM Hashes with Hashcat.srt 4.66 KB
19. Attacking Active Directory Post-Compromise Attacks/7. Pass the Hash Attacks.mp4 53.61 MB
19. Attacking Active Directory Post-Compromise Attacks/7. Pass the Hash Attacks.srt 7.70 KB
19. Attacking Active Directory Post-Compromise Attacks/8. Pass Attack Mitigations.mp4 14.42 MB
19. Attacking Active Directory Post-Compromise Attacks/8. Pass Attack Mitigations.srt 4.14 KB
19. Attacking Active Directory Post-Compromise Attacks/9. Token Impersonation Overview.mp4 16.22 MB
19. Attacking Active Directory Post-Compromise Attacks/9. Token Impersonation Overview.srt 5.34 KB
2. Introduction/1. Introduction and Course Overview.mp4 10.26 MB
2. Introduction/1. Introduction and Course Overview.srt 5.96 KB
2. Introduction/2. Frequently Asked Questions Guide.mp4 7.98 MB
2. Introduction/2. Frequently Asked Questions Guide.srt 1.42 KB
2. Introduction/2.1 Course FAQ - External Option.html 124 B
2. Introduction/2.1 Practical Ethical Hacking - FAQ.pdf 163.38 KB
2. Introduction/2.2 Course FAQ - External Option.html 124 B
2. Introduction/2.2 Practical Ethical Hacking - FAQ.pdf 163.38 KB
2. Introduction/3. A Day in the Life of an Ethical Hacker.mp4 40.94 MB
2. Introduction/3. A Day in the Life of an Ethical Hacker.srt 25.92 KB
20. Post Exploitation/1. Introduction.mp4 2.76 MB
20. Post Exploitation/1. Introduction.srt 2.74 KB
20. Post Exploitation/2. File Transfers Review.mp4 8.04 MB
20. Post Exploitation/2. File Transfers Review.srt 3.52 KB
20. Post Exploitation/3. Maintaining Access Overview.mp4 7.81 MB
20. Post Exploitation/3. Maintaining Access Overview.srt 5.32 KB
20. Post Exploitation/4. Pivoting Lab Setup.mp4 59.09 MB
20. Post Exploitation/4. Pivoting Lab Setup.srt 8.14 KB
20. Post Exploitation/5. Pivoting Walkthrough.mp4 52.12 MB
20. Post Exploitation/5. Pivoting Walkthrough.srt 8.39 KB
20. Post Exploitation/6. Cleaning Up.mp4 5.59 MB
20. Post Exploitation/6. Cleaning Up.srt 4.09 KB
21. Web Application Enumeration, Revisited/1. Introduction.mp4 3.56 MB
21. Web Application Enumeration, Revisited/1. Introduction.srt 2.67 KB
21. Web Application Enumeration, Revisited/2. Installing Go.mp4 48.94 MB
21. Web Application Enumeration, Revisited/2. Installing Go.srt 4.47 KB
21. Web Application Enumeration, Revisited/3. Finding Subdomains with Assetfinder.mp4 36.39 MB
21. Web Application Enumeration, Revisited/3. Finding Subdomains with Assetfinder.srt 9.70 KB
21. Web Application Enumeration, Revisited/4. Finding Subdomains with Amass.mp4 56.97 MB
21. Web Application Enumeration, Revisited/4. Finding Subdomains with Amass.srt 7.44 KB
21. Web Application Enumeration, Revisited/5. Finding Alive Domains with Httprobe.mp4 75.67 MB
21. Web Application Enumeration, Revisited/5. Finding Alive Domains with Httprobe.srt 9.71 KB
21. Web Application Enumeration, Revisited/6. Screenshotting Websites with GoWitness.mp4 33.70 MB
21. Web Application Enumeration, Revisited/6. Screenshotting Websites with GoWitness.srt 4.80 KB
21. Web Application Enumeration, Revisited/7. Automating the Enumeration Process.mp4 59.54 MB
21. Web Application Enumeration, Revisited/7. Automating the Enumeration Process.srt 8.21 KB
21. Web Application Enumeration, Revisited/7.1 sumrecon - Github.html 102 B
21. Web Application Enumeration, Revisited/7.2 TCM's Modified Script.html 90 B
22. Testing the Top 10 Web Application Vulnerabilities/1. Introduction.mp4 3.94 MB
22. Testing the Top 10 Web Application Vulnerabilities/1. Introduction.srt 2.08 KB
22. Testing the Top 10 Web Application Vulnerabilities/10. Broken Authentication Overview and Defenses.mp4 78.64 MB
22. Testing the Top 10 Web Application Vulnerabilities/10. Broken Authentication Overview and Defenses.srt 8.28 KB
22. Testing the Top 10 Web Application Vulnerabilities/10.1 Top 10-2017 A2-Broken Authentication.html 129 B
22. Testing the Top 10 Web Application Vulnerabilities/11. Testing for Broken Authentication.mp4 63.53 MB
22. Testing the Top 10 Web Application Vulnerabilities/11. Testing for Broken Authentication.srt 10.92 KB
22. Testing the Top 10 Web Application Vulnerabilities/12. Sensitive Data Exposure Overview and Defenses.mp4 66.65 MB
22. Testing the Top 10 Web Application Vulnerabilities/12. Sensitive Data Exposure Overview and Defenses.srt 6.75 KB
22. Testing the Top 10 Web Application Vulnerabilities/12.1 Top 10-2017 A3-Sensitive Data Exposure.html 131 B
22. Testing the Top 10 Web Application Vulnerabilities/13. Testing for Sensitive Data Exposure.mp4 79.91 MB
22. Testing the Top 10 Web Application Vulnerabilities/13. Testing for Sensitive Data Exposure.srt 11.16 KB
22. Testing the Top 10 Web Application Vulnerabilities/14. XML External Entities (XXE) Overview.mp4 28.18 MB
22. Testing the Top 10 Web Application Vulnerabilities/14. XML External Entities (XXE) Overview.srt 13.14 KB
22. Testing the Top 10 Web Application Vulnerabilities/14.1 Top 10-2017 A4-XML External Entities (XXE).html 135 B
22. Testing the Top 10 Web Application Vulnerabilities/15. XXE Attack and Defense.mp4 77.44 MB
22. Testing the Top 10 Web Application Vulnerabilities/15. XXE Attack and Defense.srt 11.41 KB
22. Testing the Top 10 Web Application Vulnerabilities/16. Broken Access Control Overview.mp4 48.53 MB
22. Testing the Top 10 Web Application Vulnerabilities/16. Broken Access Control Overview.srt 4.71 KB
22. Testing the Top 10 Web Application Vulnerabilities/16.1 Top 10-2017 A5-Broken Access Control.html 129 B
22. Testing the Top 10 Web Application Vulnerabilities/17. Broken Access Control Walkthrough.mp4 35.49 MB
22. Testing the Top 10 Web Application Vulnerabilities/17. Broken Access Control Walkthrough.srt 6.22 KB
22. Testing the Top 10 Web Application Vulnerabilities/18. Security Misconfiguration Attacks and Defenses.mp4 68.17 MB
22. Testing the Top 10 Web Application Vulnerabilities/18. Security Misconfiguration Attacks and Defenses.srt 7.72 KB
22. Testing the Top 10 Web Application Vulnerabilities/18.1 Top 10-2017 A6-Security Misconfiguration.html 133 B
22. Testing the Top 10 Web Application Vulnerabilities/19. Cross-Site Scripting (XSS) Overview.mp4 81.88 MB
22. Testing the Top 10 Web Application Vulnerabilities/19. Cross-Site Scripting (XSS) Overview.srt 15.16 KB
22. Testing the Top 10 Web Application Vulnerabilities/19.1 DOM BASED CROSS SITE SCRIPTING.html 98 B
22. Testing the Top 10 Web Application Vulnerabilities/19.1 XSS Game.html 90 B
22. Testing the Top 10 Web Application Vulnerabilities/19.2 DOM BASED CROSS SITE SCRIPTING.html 98 B
22. Testing the Top 10 Web Application Vulnerabilities/19.2 Top 10-2017 A7-Cross-Site Scripting (XSS).html 134 B
22. Testing the Top 10 Web Application Vulnerabilities/19.3 Top 10-2017 A7-Cross-Site Scripting (XSS).html 134 B
22. Testing the Top 10 Web Application Vulnerabilities/19.3 XSS Game.html 90 B
22. Testing the Top 10 Web Application Vulnerabilities/2. The OWASP Top 10 and OWASP Testing Checklist.mp4 130.37 MB
22. Testing the Top 10 Web Application Vulnerabilities/2. The OWASP Top 10 and OWASP Testing Checklist.srt 15.50 KB
22. Testing the Top 10 Web Application Vulnerabilities/2.1 OWASP Testing Checklist.html 114 B
22. Testing the Top 10 Web Application Vulnerabilities/2.1 OWASP Top 10.html 129 B
22. Testing the Top 10 Web Application Vulnerabilities/2.2 OWASP Testing Guide.html 104 B
22. Testing the Top 10 Web Application Vulnerabilities/2.3 OWASP Testing Checklist.html 114 B
22. Testing the Top 10 Web Application Vulnerabilities/2.3 OWASP Top 10.html 129 B
22. Testing the Top 10 Web Application Vulnerabilities/20. Reflected XSS Walkthrough.mp4 73.60 MB
22. Testing the Top 10 Web Application Vulnerabilities/20. Reflected XSS Walkthrough.srt 9.99 KB
22. Testing the Top 10 Web Application Vulnerabilities/21. Stored XSS Walkthrough.mp4 49.06 MB
22. Testing the Top 10 Web Application Vulnerabilities/21. Stored XSS Walkthrough.srt 9.16 KB
22. Testing the Top 10 Web Application Vulnerabilities/22. Preventing XSS.mp4 11.87 MB
22. Testing the Top 10 Web Application Vulnerabilities/22. Preventing XSS.srt 5.17 KB
22. Testing the Top 10 Web Application Vulnerabilities/23. Insecure Deserialization.mp4 57.29 MB
22. Testing the Top 10 Web Application Vulnerabilities/23. Insecure Deserialization.srt 6.00 KB
22. Testing the Top 10 Web Application Vulnerabilities/23.1 Top 10-2017 A8-Insecure Deserialization.html 132 B
22. Testing the Top 10 Web Application Vulnerabilities/24. Using Components with Known Vulnerabilities.mp4 52.93 MB
22. Testing the Top 10 Web Application Vulnerabilities/24. Using Components with Known Vulnerabilities.srt 6.87 KB
22. Testing the Top 10 Web Application Vulnerabilities/24.1 Top 10-2017 A9-Using Components with Known Vulnerabilities.html 151 B
22. Testing the Top 10 Web Application Vulnerabilities/25. Insufficient Logging and Monitoring.mp4 40.52 MB
22. Testing the Top 10 Web Application Vulnerabilities/25. Insufficient Logging and Monitoring.srt 4.85 KB
22. Testing the Top 10 Web Application Vulnerabilities/25.1 Top 10-2017 A10-Insufficient Logging & Monitoring.html 176 B
22. Testing the Top 10 Web Application Vulnerabilities/3. Installing OWASP Juice Shop.mp4 88.63 MB
22. Testing the Top 10 Web Application Vulnerabilities/3. Installing OWASP Juice Shop.srt 10.21 KB
22. Testing the Top 10 Web Application Vulnerabilities/3.1 Installing Docker on Kali.html 142 B
22. Testing the Top 10 Web Application Vulnerabilities/3.2 OWASP Juice Shop.html 101 B
22. Testing the Top 10 Web Application Vulnerabilities/4. Installing Foxy Proxy.mp4 27.14 MB
22. Testing the Top 10 Web Application Vulnerabilities/4. Installing Foxy Proxy.srt 3.01 KB
22. Testing the Top 10 Web Application Vulnerabilities/5. Exploring Burp Suite.mp4 106.03 MB
22. Testing the Top 10 Web Application Vulnerabilities/5. Exploring Burp Suite.srt 16.26 KB
22. Testing the Top 10 Web Application Vulnerabilities/6. Introducing the Score Board.mp4 30.66 MB
22. Testing the Top 10 Web Application Vulnerabilities/6. Introducing the Score Board.srt 4.30 KB
22. Testing the Top 10 Web Application Vulnerabilities/7. SQL Injection Attacks Overview.mp4 19.24 MB
22. Testing the Top 10 Web Application Vulnerabilities/7. SQL Injection Attacks Overview.srt 7.01 KB
22. Testing the Top 10 Web Application Vulnerabilities/7.1 Top 10-2017 A1-Injection.html 117 B
22. Testing the Top 10 Web Application Vulnerabilities/8. SQL Injection Walkthrough.mp4 85.21 MB
22. Testing the Top 10 Web Application Vulnerabilities/8. SQL Injection Walkthrough.srt 14.46 KB
22. Testing the Top 10 Web Application Vulnerabilities/9. SQL Injection Defenses.mp4 9.28 MB
22. Testing the Top 10 Web Application Vulnerabilities/9. SQL Injection Defenses.srt 3.71 KB
23. Wireless Penetration Testing/1. Wireless Penetration Testing Overview.mp4 48.37 MB
23. Wireless Penetration Testing/1. Wireless Penetration Testing Overview.srt 16.60 KB
23. Wireless Penetration Testing/2. WPA PSK Exploit Walkthrough.mp4 126.93 MB
23. Wireless Penetration Testing/2. WPA PSK Exploit Walkthrough.srt 19.56 KB
24. Legal Documents and Report Writing/1. Common Legal Documents.mp4 25.43 MB
24. Legal Documents and Report Writing/1. Common Legal Documents.srt 11.28 KB
24. Legal Documents and Report Writing/2. Pentest Report Writing.mp4 62.60 MB
24. Legal Documents and Report Writing/2. Pentest Report Writing.srt 17.92 KB
24. Legal Documents and Report Writing/2.1 Demo Company - Security Assessment Findings Report.pdf 319.08 KB
24. Legal Documents and Report Writing/2.1 Sample Pentest Report Github.html 129 B
24. Legal Documents and Report Writing/2.2 Demo Company - Security Assessment Findings Report.pdf 319.08 KB
24. Legal Documents and Report Writing/2.2 Sample Pentest Report Github.html 129 B
24. Legal Documents and Report Writing/3. Reviewing a Real Pentest Report.mp4 79.26 MB
24. Legal Documents and Report Writing/3. Reviewing a Real Pentest Report.srt 19.52 KB
25. Career Advice/1. Career Advice.mp4 36.50 MB
25. Career Advice/1. Career Advice.srt 17.01 KB
26. BONUS Section/1. BONUS LECTURE Course Discord Channel and Other Author Resources.mp4 42.55 MB
26. BONUS Section/1. BONUS LECTURE Course Discord Channel and Other Author Resources.srt 6.88 KB
26. BONUS Section/1.1 Course Discord.html 87 B
26. BONUS Section/1.1 The Cyber Mentor.html 87 B
26. BONUS Section/1.2 Course Discord.html 87 B
26. BONUS Section/1.2 The Cyber Mentor.html 87 B
3. Note Keeping/1. Part 1 Effective Note Keeping.mp4 49.30 MB
3. Note Keeping/1. Part 1 Effective Note Keeping.srt 10.70 KB
3. Note Keeping/1.1 KeepNote.html 81 B
3. Note Keeping/1.1 cherrytree.html 96 B
3. Note Keeping/1.2 Joplin.html 96 B
3. Note Keeping/1.2 OneNote.html 132 B
3. Note Keeping/1.3 Joplin.html 96 B
3. Note Keeping/1.3 cherrytree.html 96 B
3. Note Keeping/1.4 KeepNote.html 81 B
3. Note Keeping/1.4 OneNote.html 132 B
3. Note Keeping/2. Part 2 Important Tools.mp4 38.74 MB
3. Note Keeping/2. Part 2 Important Tools.srt 9.12 KB
4. Networking Refresher/1. Introduction.mp4 3.46 MB
4. Networking Refresher/1. Introduction.srt 1.71 KB
4. Networking Refresher/2. IP Addresses.mp4 78.34 MB
4. Networking Refresher/2. IP Addresses.srt 18.44 KB
4. Networking Refresher/3. MAC Addresses.mp4 28.67 MB
4. Networking Refresher/3. MAC Addresses.srt 4.66 KB
4. Networking Refresher/4. TCP, UDP, and the Three-Way Handshake.mp4 21.72 MB
4. Networking Refresher/4. TCP, UDP, and the Three-Way Handshake.srt 7.94 KB
4. Networking Refresher/5. Common Ports and Protocols.mp4 16.73 MB
4. Networking Refresher/5. Common Ports and Protocols.srt 8.62 KB
4. Networking Refresher/6. The OSI Model.mp4 12.55 MB
4. Networking Refresher/6. The OSI Model.srt 7.66 KB
4. Networking Refresher/7. Subnetting Part 1 - Methodology.mp4 207.87 MB
4. Networking Refresher/7. Subnetting Part 1 - Methodology.srt 39.42 KB
4. Networking Refresher/7.1 Seven Second Subnetting.html 104 B
4. Networking Refresher/7.1 Subnet-Guide.xlsx 15.13 KB
4. Networking Refresher/7.2 Seven Second Subnetting.html 104 B
4. Networking Refresher/7.2 Subnet-Guide.xlsx 15.13 KB
4. Networking Refresher/8. Subnetting Part 2 - Hands-On Challenge.mp4 36.19 MB
4. Networking Refresher/8. Subnetting Part 2 - Hands-On Challenge.srt 5.31 KB
5. Setting Up Our Lab/1. Installing VMWare Virtualbox.mp4 54.83 MB
5. Setting Up Our Lab/1. Installing VMWare Virtualbox.srt 9.11 KB
5. Setting Up Our Lab/1.1 Oracle VirtualBox.html 102 B
5. Setting Up Our Lab/1.1 VMWare Workstation Player.html 146 B
5. Setting Up Our Lab/1.2 Oracle VirtualBox.html 102 B
5. Setting Up Our Lab/1.2 VMWare Workstation Player.html 146 B
5. Setting Up Our Lab/2. Linux Image Repository (UPDATE).mp4 3.30 MB
5. Setting Up Our Lab/2. Linux Image Repository (UPDATE).srt 2.18 KB
5. Setting Up Our Lab/2.1 Share Repository.html 127 B
5. Setting Up Our Lab/3. Installing Kali Linux.mp4 45.18 MB
5. Setting Up Our Lab/3. Installing Kali Linux.srt 7.85 KB
5. Setting Up Our Lab/3.1 Kali Linux Download.html 143 B
6. Introduction to Linux/1. Exploring Kali Linux.mp4 70.26 MB
6. Introduction to Linux/1. Exploring Kali Linux.srt 70.27 MB
6. Introduction to Linux/2. Navigating the File System.mp4 113.39 MB
6. Introduction to Linux/2. Navigating the File System.srt 16.43 KB
6. Introduction to Linux/3. Users and Privileges.mp4 94.18 MB
6. Introduction to Linux/3. Users and Privileges.srt 13.18 KB
6. Introduction to Linux/4. Common Network Commands.mp4 63.74 MB
6. Introduction to Linux/4. Common Network Commands.srt 7.45 KB
6. Introduction to Linux/5. Viewing, Creating, and Editing Files.mp4 39.88 MB
6. Introduction to Linux/5. Viewing, Creating, and Editing Files.srt 39.88 MB
6. Introduction to Linux/6. Starting and Stopping Kali Services.mp4 82.16 MB
6. Introduction to Linux/6. Starting and Stopping Kali Services.srt 10.62 KB
6. Introduction to Linux/7. Installing and Updating Tools.mp4 75.53 MB
6. Introduction to Linux/7. Installing and Updating Tools.srt 10.13 KB
6. Introduction to Linux/8. Scripting with Bash.mp4 133.33 MB
6. Introduction to Linux/8. Scripting with Bash.srt 29.79 KB
6. Introduction to Linux/8.1 ipsweep.sh 213 B
7. Introduction to Python/1. Introduction.mp4 7.72 MB
7. Introduction to Python/1. Introduction.srt 3.39 KB
7. Introduction to Python/10. Tuples.mp4 31.80 MB
7. Introduction to Python/10. Tuples.srt 3.41 KB
7. Introduction to Python/11. Looping.mp4 58.75 MB
7. Introduction to Python/11. Looping.srt 6.65 KB
7. Introduction to Python/12. Importing Modules.mp4 50.86 MB
7. Introduction to Python/12. Importing Modules.srt 8.12 KB
7. Introduction to Python/13. Advanced Strings.mp4 145.43 MB
7. Introduction to Python/13. Advanced Strings.srt 17.43 KB
7. Introduction to Python/14. Dictionaries.mp4 114.61 MB
7. Introduction to Python/14. Dictionaries.srt 9.14 KB
7. Introduction to Python/15. Sockets.mp4 47.38 MB
7. Introduction to Python/15. Sockets.srt 7.84 KB
7. Introduction to Python/16. Building a Port Scanner.mp4 247.60 MB
7. Introduction to Python/16. Building a Port Scanner.srt 27.78 KB
7. Introduction to Python/2. Strings.mp4 55.02 MB
7. Introduction to Python/2. Strings.srt 9.81 KB
7. Introduction to Python/3. Math.mp4 43.27 MB
7. Introduction to Python/3. Math.srt 7.49 KB
7. Introduction to Python/4. Variables & Methods.mp4 110.61 MB
7. Introduction to Python/4. Variables & Methods.srt 13.86 KB
7. Introduction to Python/5. Functions.mp4 97.18 MB
7. Introduction to Python/5. Functions.srt 13.75 KB
7. Introduction to Python/6. Boolean Expressions.mp4 37.40 MB
7. Introduction to Python/6. Boolean Expressions.srt 5.64 KB
7. Introduction to Python/7. Relational and Boolean Operators.mp4 74.88 MB
7. Introduction to Python/7. Relational and Boolean Operators.srt 7.98 KB
7. Introduction to Python/8. Conditional Statements.mp4 122.47 MB
7. Introduction to Python/8. Conditional Statements.srt 11.17 KB
7. Introduction to Python/9. Lists.mp4 143.16 MB
7. Introduction to Python/9. Lists.srt 14.25 KB
8. The Ethical Hacker Methodology/1. The Five Stages of Ethical Hacking.mp4 13.61 MB
8. The Ethical Hacker Methodology/1. The Five Stages of Ethical Hacking.srt 7.59 KB
9. Information Gathering (Reconnaissance)/1. Passive Reconnaissance Overview.mp4 21.33 MB
9. Information Gathering (Reconnaissance)/1. Passive Reconnaissance Overview.srt 11.44 KB
9. Information Gathering (Reconnaissance)/10. Google Fu.mp4 58.40 MB
9. Information Gathering (Reconnaissance)/10. Google Fu.srt 7.63 KB
9. Information Gathering (Reconnaissance)/11. Utilizing Social Media.mp4 40.18 MB
9. Information Gathering (Reconnaissance)/11. Utilizing Social Media.srt 8.15 KB
9. Information Gathering (Reconnaissance)/2. Identifying Our Target.mp4 42.91 MB
9. Information Gathering (Reconnaissance)/2. Identifying Our Target.srt 5.14 KB
9. Information Gathering (Reconnaissance)/3. E-Mail Address Gathering with Hunter.io.mp4 20.35 MB
9. Information Gathering (Reconnaissance)/3. E-Mail Address Gathering with Hunter.io.srt 7.40 KB
9. Information Gathering (Reconnaissance)/4. Gathering Breached Credentials with Breach-Parse.mp4 69.79 MB
9. Information Gathering (Reconnaissance)/4. Gathering Breached Credentials with Breach-Parse.srt 10.22 KB
9. Information Gathering (Reconnaissance)/5. Utilizing theharvester.mp4 50.97 MB
9. Information Gathering (Reconnaissance)/5. Utilizing theharvester.srt 5.35 KB
9. Information Gathering (Reconnaissance)/6. Hunting Subdomains - Part 1.mp4 79.51 MB
9. Information Gathering (Reconnaissance)/6. Hunting Subdomains - Part 1.srt 7.12 KB
9. Information Gathering (Reconnaissance)/7. Hunting Subdomains - Part 2.mp4 65.93 MB
9. Information Gathering (Reconnaissance)/7. Hunting Subdomains - Part 2.srt 6.31 KB
9. Information Gathering (Reconnaissance)/8. Identifying Website Technologies.mp4 96.39 MB
9. Information Gathering (Reconnaissance)/8. Identifying Website Technologies.srt 10.27 KB
9. Information Gathering (Reconnaissance)/9. Information Gathering with Burp Suite.mp4 105.72 MB
9. Information Gathering (Reconnaissance)/9. Information Gathering with Burp Suite.srt 13.67 KB
Readme.txt 962 B
[GigaCourse.com].url 49 B
udp://9.rarbg.me:2710/announce
udp://9.rarbg.to:2710/announce
udp://bt1.archive.org:6969/announce
udp://coppersurfer.tk:6969/announce
udp://exodus.desync.com:6969/announce
udp://open.stealth.si:80/announce
udp://p4p.arenabg.com:1337/announce
udp://retracker.lanta-net.ru:2710/announce
udp://tracker.cyberia.is:6969/announce
udp://tracker.leechers-paradise.org:6969/announce
udp://tracker.moeking.me:6969/announce
udp://tracker.opentrackr.org:1337/announce
udp://tracker.sbsub.com:2710/announce
udp://tracker.tiny-vps.com:6969/announce
udp://tracker.torrent.eu.org:451/announce
udp://tracker.zer0day.to:1337/announce

TorrentBank
Copyright © 2024