8.94 GB | 12min 26s | mp4 | 1280X720 | 16:9
Genre:eLearning |Language:English
Files Included :
001 Introduction.mp4 (268.01 MB)
003 Exam Tips.mp4 (18.85 MB)
001 PenTesting Overview.mp4 (13.31 MB)
002 Planning the Engagement.mp4 (23.31 MB)
003 Information Gathering.mp4 (14.3 MB)
004 Attacks and Exploits.mp4 (15.81 MB)
005 Post-Exploitation.mp4 (14.1 MB)
006 Reporting.mp4 (21.68 MB)
007 Overview of a PenTest.mp4 (67.71 MB)
001 Pre-Engagement Activities (OBJ 1 1, 1 2).mp4 (15.25 MB)
002 Regulations and Standards (OBJ 1 1, 1 2).mp4 (38.39 MB)
003 Types of Assessments (OBJ 1 1).mp4 (29.69 MB)
004 Types of Agreements.mp4 (36.41 MB)
005 Legal and Ethical Considerations (OBJ 1 1, 1 2).mp4 (24.8 MB)
006 Rules of Engagement (OBJ 1 1, 1 2).mp4 (43.21 MB)
007 Target Selection (OBJ 1 1).mp4 (29.12 MB)
008 Shared Responsibility Model (OBJ 1 1).mp4 (38.92 MB)
009 Preparing to PenTest a Cloud Provider (OBJ 1 1).mp4 (12.08 MB)
001 Frameworks (OBJ 1 3).mp4 (43.76 MB)
002 MITRE ATT&CK (OBJ 1 3).mp4 (37.05 MB)
003 OWASP (OBJ 1 3).mp4 (11.67 MB)
004 MASVS (OBJ 1 3).mp4 (9.77 MB)
005 PTES (OBJ 1 3).mp4 (23.95 MB)
006 CREST (OBJ 1 3).mp4 (21.75 MB)
007 STRIDE (OBJ 1 3).mp4 (21.37 MB)
008 OSSTMM (OBJ 1 3).mp4 (29.23 MB)
009 Purdue Model (OBJ 1 3).mp4 (10.36 MB)
010 OCTAVE (OBJ 1 3).mp4 (40.37 MB)
011 DREAD (OBJ 1 3).mp4 (26.64 MB)
012 Using the MITRE ATT&CK Framework (OBJ 1 3).mp4 (44.37 MB)
001 Information Gathering (OBJ 2 1).mp4 (14.03 MB)
002 Passive Reconnaissance (OBJ 2 1).mp4 (23.99 MB)
003 Network Sniffing (OBJ 2 1).mp4 (12.22 MB)
004 Active Reconnaissance (OBJ 2 1).mp4 (22.42 MB)
005 Port and Protocol Scanning (OBJ 2 1).mp4 (15.52 MB)
006 HTML Scraping and Cached Pages (OBJ 2 1).mp4 (8.08 MB)
007 Banner Grabbing (OBJ 2 1).mp4 (20.76 MB)
008 Conducting Banner Grabbing (OBJ 2 1).mp4 (14.75 MB)
001 Open-Source Intelligence (OSINT) (OBJ 2 1).mp4 (12.26 MB)
002 Social Media and Job Boards (OBJ 2 1).mp4 (25.68 MB)
003 Information Disclosures (OBJ 2 1).mp4 (12 MB)
004 Cryptographic Flaws (OBJ 2 1).mp4 (30.34 MB)
005 DNS Lookups (OBJ 2 1).mp4 (47.49 MB)
006 Certificate Transparency Logs (OBJ 2 1).mp4 (24.93 MB)
007 Search Engine Analysis (OBJ 2 1).mp4 (17.79 MB)
008 Conducting OSINT (OBJ 2 1).mp4 (68.73 MB)
001 Scanning and Enumeration (OBJ 2 2).mp4 (15.95 MB)
002 OS and Service Discovery (OBJ 2 2).mp4 (149.9 MB)
003 Enumerating Protocols (OBJ 2 2).mp4 (15.85 MB)
004 Enumerating DNS (OBJ 2 2).mp4 (11.54 MB)
005 Enumerating Directories (OBJ 2 2).mp4 (18.52 MB)
006 Enumerating Hosts (OBJ 2 2).mp4 (10.78 MB)
007 Enumerating Users (OBJ 2 2).mp4 (11.32 MB)
008 Enumerating Email (OBJ 2 2).mp4 (8.88 MB)
009 Enumerating Permissions (OBJ 2 2).mp4 (11.56 MB)
010 Enumerating Wireless Devices (OBJ 2 2).mp4 (34.66 MB)
011 Enumerating Secrets (OBJ 2 2).mp4 (15.55 MB)
012 Enumerating the Web (OBJ 2 2).mp4 (26.6 MB)
013 Attack Path Mapping (OBJ 2 2).mp4 (15.07 MB)
001 Reconnaissance and Enumeration Tools (OBJ 2 4).mp4 (82.07 MB)
002 Wayback Machine (OBJ 2 4).mp4 (8.28 MB)
003 theHarvester and Hunter io (OBJ 2 4).mp4 (15.31 MB)
004 OSINT Tools (OBJ 2 4, 4 8).mp4 (22.3 MB)
005 Whois and recon-ng (OBJ 2 4).mp4 (81.98 MB)
006 nslookup and dig (OBJ 2 4).mp4 (18.43 MB)
007 DNSdumpster and Amass (OBJ 2 4).mp4 (26.69 MB)
008 Shodan and Censys io (OBJ 2 4).mp4 (15.99 MB)
009 tcpdump (OBJ 2 4).mp4 (15.61 MB)
010 Wireshark (OBJ 2 4).mp4 (35.85 MB)
011 Wireless Analysis Tools (OBJ 2 4).mp4 (24.51 MB)
001 Nmap and NSE (OBJ 2 4, 4 2).mp4 (8.05 MB)
002 Nmap Discovery Scans (OBJ 2 4, 4 2).mp4 (42.05 MB)
003 Nmap Port Scans (OBJ 2 4, 4 2).mp4 (32.93 MB)
004 Nmap Fingerprinting (OBJ 2 4, 4 2).mp4 (12.92 MB)
005 Using Nmap (OBJ 2 4, 4 2).mp4 (98.09 MB)
006 Nmap Scripting Engine (OBJ 2 4, 4 2).mp4 (86 MB)
001 Scripting Basics (OBJ 2 3).mp4 (12.86 MB)
002 Shells and Programming Languages (OBJ 2 3).mp4 (63.29 MB)
003 Variables (OBJ 2 3).mp4 (16.6 MB)
004 Loops (OBJ 2 3).mp4 (8.15 MB)
005 Logic Control (OBJ 2 3).mp4 (7.68 MB)
006 Data Structures (OBJ 2 3).mp4 (42.37 MB)
007 Object Oriented Programming (OBJ 2 3).mp4 (37.28 MB)
001 Modifying Scripts (OBJ 2 3).mp4 (9.72 MB)
002 Bash Fundamentals (OBJ 2 3).mp4 (39.86 MB)
003 Understanding a Bash Script (OBJ 2 3).mp4 (10.14 MB)
004 Modifying a Bash Script (OBJ 2 3).mp4 (26.48 MB)
005 PowerShell Fundamentals (OBJ 2 3).mp4 (24.3 MB)
006 Understanding a PowerShell Script (OBJ 2 3).mp4 (10.07 MB)
007 Modifying a PowerShell Script (OBJ 2 3).mp4 (17.94 MB)
008 Python Fundamentals (OBJ 2 3).mp4 (60.6 MB)
009 Understanding a Python Script (OBJ 2 3).mp4 (8.95 MB)
010 Modifying a Python Script (OBJ 2 3).mp4 (17.27 MB)
001 Analyzing Scans (OBJ 3 2, 4 1).mp4 (14.3 MB)
002 Positive and Negative Results (OBJ 3 2).mp4 (9.37 MB)
003 Validating Scan Results (OBJ 3 2).mp4 (19.78 MB)
004 Using CVEs and CVSS (OBJ 4 1).mp4 (19.86 MB)
005 Exploit Prediction Scoring System (OBJ 4 1).mp4 (16.25 MB)
006 Target Prioritization (OBJ 4 1).mp4 (17.38 MB)
007 Common Target Criteria (OBJ 4 1).mp4 (22.97 MB)
008 Scripting for Result Validation (OBJ 3 2).mp4 (9.27 MB)
009 Scan Validations (OBJ 3 2).mp4 (31.08 MB)
010 Capability Selection (OBJ 3 2, 4 1).mp4 (10.72 MB)
011 Documenting the Attack (OBJ 4 1).mp4 (12.59 MB)
012 Other Attack Considerations (OBJ 4 1).mp4 (43.06 MB)
001 Discovering Vulnerabilities (OBJ 3 1).mp4 (10.04 MB)
002 Application Scanning (OBJ 3 1).mp4 (31.6 MB)
003 Software Analysis (OBJ 3 1).mp4 (26.38 MB)
004 Host-Based Scanning (OBJ 3 1).mp4 (26.68 MB)
005 Network Scanning (OBJ 3 1).mp4 (18 MB)
006 Mobile Scanning (OBJ 3 1).mp4 (11.9 MB)
007 Container Scanning (OBJ 3 1).mp4 (22.4 MB)
008 Scanning IaC (OBJ 3 1).mp4 (29.47 MB)
009 ICS Vulnerability Discovery (OBJ 3 1).mp4 (16.31 MB)
010 Wireless Scans (OBJ 3 1).mp4 (14.73 MB)
011 Static Code Analysis (SonarQube) (OBJ 3 1).mp4 (21.21 MB)
001 Vulnerability Discovery Tools (OBJ 3 1).mp4 (6.78 MB)
002 Nikto (OBJ 3 1).mp4 (66.74 MB)
003 GreenboneOpenVAS (OBJ 3 1).mp4 (79.99 MB)
004 Trivy (OBJ 3 1).mp4 (18.55 MB)
005 BloodHound (OBJ 3 1).mp4 (28.15 MB)
006 PowerSploit (OBJ 3 1).mp4 (3.52 MB)
007 Grype (OBJ 3 1).mp4 (6.68 MB)
008 Kube-Hunter (OBJ 3 1).mp4 (25.14 MB)
009 TruffleHog (OBJ 3 1).mp4 (16.75 MB)
001 Social Engineering Attacks (OBJ 4 8).mp4 (19.63 MB)
002 Methods of Influence (OBJ 4 8).mp4 (81.54 MB)
003 Phishing Campaigns (OBJ 4 8).mp4 (34.24 MB)
004 Using the Social Engineering Toolkit (SET) (OBJ 4 8).mp4 (39.13 MB)
005 Gophish (OBJ 4 8).mp4 (16.96 MB)
006 Impersonation (OBJ 4 8).mp4 (41.34 MB)
007 Surveillance Techniques (OBJ 4 8).mp4 (16.54 MB)
008 Watering Hole (OBJ 4 8).mp4 (9.69 MB)
009 Evilginx (OBJ 4 8).mp4 (31.69 MB)
010 Tailgating and Piggybacking (OBJ 4 8).mp4 (23.23 MB)
011 Browser Exploitation Framework (BeEF) (OBJ 4 8).mp4 (20.43 MB)
001 Wireless Attacks (OBJ 4 7).mp4 (12.18 MB)
002 Wireless Security (OBJ 4 7).mp4 (114.67 MB)
003 Wireless Signal Exploitation (OBJ 4 7).mp4 (31.55 MB)
004 Aircrack-ng (OBJ 4 7).mp4 (25.41 MB)
005 Wireless Hacking (OBJ 4 7).mp4 (55.95 MB)
006 WPS PIN Attacks (OBJ 4 7).mp4 (132 MB)
007 Captive Portal Attacks (OBJ 4 7).mp4 (32.95 MB)
008 Evil Twin (OBJ 4 7).mp4 (9.97 MB)
009 Kismet (OBJ 4 7).mp4 (27.81 MB)
010 Wi-Fi Protocol Fuzzing (OBJ 4 7).mp4 (22.52 MB)
001 Network Attacks (OBJ 4 2, 4 3, 4 5).mp4 (23.19 MB)
002 Stress Testing (OBJ 4 2).mp4 (36.35 MB)
003 Bypassing Segmentation (OBJ 4 2).mp4 (31.42 MB)
004 MAC Spoofing (OBJ 4 2).mp4 (38.68 MB)
005 NAC Bypass (OBJ 4 2).mp4 (30.16 MB)
006 Session-Based Attacks (OBJ 4 2).mp4 (9.47 MB)
007 Service Exploitation (OBJ 4 2).mp4 (20.41 MB)
008 Packet Crafting (OBJ 4 2).mp4 (19.31 MB)
009 Netcat (OBJ 4 2).mp4 (33 MB)
010 Using Netcat (OBJ 4 2).mp4 (24.21 MB)
011 Default Network Credentials (OBJ 4 2).mp4 (28.37 MB)
012 LLMNRNBT-NS Poisoning (OBJ 4 2).mp4 (16.09 MB)
013 ARP Poisoning (OBJ 4 2).mp4 (34.16 MB)
014 Intro to Metasploit (OBJ 4 2).mp4 (17.89 MB)
001 Authentication Attacks (OBJ 4 2, 4 3, 4 5).mp4 (41.32 MB)
002 Types of Password Attack (OBJ 4 3).mp4 (7.59 MB)
003 Password Cracking Tools (OBJ 4 3).mp4 (72.14 MB)
004 Credential Attacks (OBJ 4 3).mp4 (28.2 MB)
005 Credential Passing Attacks (OBJ 4 3).mp4 (23.14 MB)
006 Directory Service Attacks (OBJ 4 2, 4 3).mp4 (19.32 MB)
007 CrackMapExec (CME) (OBJ 4 3).mp4 (16.73 MB)
008 SAML Attacks (OBJ 4 3).mp4 (24.43 MB)
009 OpenID Connect (OIDC) Attacks (OBJ 4 3).mp4 (15.36 MB)
010 Hash Attacks (OBJ 4 5).mp4 (17.62 MB)
001 Host Attacks (OBJ 4 4).mp4 (14.93 MB)
002 Privilege Escalation (OBJ 4 4).mp4 (35.35 MB)
003 Conducting Privilege Escalation (OBJ 4 4).mp4 (179.48 MB)
004 Credential Harvesting (OBJ 4 4).mp4 (13.59 MB)
005 Misconfigured Endpoints (OBJ 4 4).mp4 (18.17 MB)
006 Unquoted Service Paths (OBJ 4 4).mp4 (16.65 MB)
007 Disabling Security Software (OBJ 4 4).mp4 (31.35 MB)
008 Payload Obfuscation (OBJ 4 4).mp4 (12.72 MB)
009 User-Controlled Access Bypass (OBJ 4 4).mp4 (64.29 MB)
010 Shell and Kiosk Escapes (OBJ 4 4).mp4 (21.86 MB)
011 Library and Process Injection (OBJ 4 4).mp4 (70.15 MB)
012 Log Tampering (OBJ 4 4).mp4 (6.53 MB)
013 Living Off the Land (OBJ 4 4).mp4 (6.58 MB)
001 Web Application Vulnerabilities (OBJ 4 3, 4 5).mp4 (33.18 MB)
002 Race Conditions (OBJ 4 5).mp4 (23.56 MB)
003 Buffer Overflows (OBJ 4 5).mp4 (63.76 MB)
004 Buffer Overflow Attacks (OBJ 4 5).mp4 (27.62 MB)
005 Authentication Flaws and Insecure References (OBJ 4 5).mp4 (39.61 MB)
006 Improper Error Handling (OBJ 4 5).mp4 (15.25 MB)
007 Improper Headers (OBJ 4 5).mp4 (25.59 MB)
008 Code Signing (OBJ 4 5).mp4 (13.73 MB)
009 Vulnerable Components (OBJ 4 5).mp4 (88.83 MB)
010 Software Composition (OBJ 4 5).mp4 (87.67 MB)
001 Web Application Attacks (OBJ 4 5).mp4 (74.04 MB)
002 Directory Traversals (OBJ 4 5).mp4 (43.03 MB)
003 Directory Traversal Tools (OBJ 4 5).mp4 (40.38 MB)
004 Cross-Site Scripting (XSS) (OBJ 4 5).mp4 (19.35 MB)
005 Request Forgeries (OBJ 4 5).mp4 (21.09 MB)
006 SQL Injections (OBJ 4 5).mp4 (37.2 MB)
007 Performing SQL Injection Attacks (OBJ 4 3, 4 5).mp4 (72.18 MB)
008 Injection Attacks (OBJ 4 5).mp4 (13.11 MB)
009 File Inclusions (OBJ 4 5).mp4 (9.61 MB)
010 Arbitrary Code Execution (OBJ 4 5).mp4 (31.29 MB)
011 Web Application Session Hijacking (OBJ 4 5).mp4 (31.7 MB)
012 Abusing APIs (OBJ 4 5).mp4 (38.24 MB)
013 OWASP ZAP (OBJ 4 5).mp4 (23.84 MB)
014 Attacking Web Applications (OBJ 4 5).mp4 (145.48 MB)
001 Cloud Attacks (OBJ 4 6 ).mp4 (9.74 MB)
002 Identity and Access Management (IAM) Misconfigurations (OBJ 4 6 ).mp4 (28.39 MB)
003 Resource Misconfigurations (OBJ 4 6 ).mp4 (35.05 MB)
004 Logging Information Exposures (OBJ 4 6 ).mp4 (27.04 MB)
005 Metadata Service Attacks (OBJ 4 6 ).mp4 (46.7 MB)
006 Image and Artifact Tampering (OBJ 4 6 ).mp4 (41.79 MB)
007 Supply Chain Attacks (OBJ 4 6 ).mp4 (48.49 MB)
008 Container Exploits and Attacks (OBJ 4 6 ).mp4 (25.14 MB)
009 Trust Relationship Abuse (OBJ 4 6 ).mp4 (39.63 MB)
010 Third-party Integration Exploits (OBJ 4 6 ).mp4 (56.58 MB)
011 Cloud Security Testing (OBJ 4 6 ).mp4 (34.76 MB)
012 Conducting Cloud Audits (OBJ 4 6 ).mp4 (86.18 MB)
001 Attacking Specialized Systems (OBJ 4 9).mp4 (8.52 MB)
002 Mobile Device Attacks (OBJ 4 9).mp4 (82.7 MB)
003 Tools for Mobile Device Attacks (OBJ 4 9).mp4 (30.77 MB)
004 Bluetooth Attacks (OBJ 4 9).mp4 (11.13 MB)
005 NFC and RFID Attacks (OBJ 4 9).mp4 (17.23 MB)
006 AI Attacks (OBJ 4 9).mp4 (39.86 MB)
007 Operational Technology (OT) (OBJ 4 9).mp4 (32.36 MB)
008 OT Attacks (OBJ 4 9).mp4 (81.29 MB)
009 Testing OT Systems (OBJ 4 9).mp4 (12.31 MB)
001 Automated Attacks (OBJ 4 10).mp4 (13.27 MB)
002 Automating Attacks with Bash (OBJ 4 10).mp4 (11.54 MB)
003 EmpirePowerSploit (OBJ 4 10).mp4 (21.02 MB)
004 PowerView (OBJ 4 10).mp4 (7.1 MB)
005 PowerUpSQL (OBJ 4 10).mp4 (33.88 MB)
006 AD Search (OBJ 4 10).mp4 (22.41 MB)
007 Impacket (OBJ 4 10).mp4 (13.03 MB)
008 Scapy (OBJ 4 10).mp4 (28.52 MB)
009 Caldera (OBJ 4 10).mp4 (34.73 MB)
010 Infection Monkey (OBJ 4 10).mp4 (19.69 MB)
011 Atomic Red Team (OBJ 4 10).mp4 (12.07 MB)
001 Persistence (OBJ 5 1).mp4 (15.22 MB)
002 Command and Control (OBJ 5 1).mp4 (11.48 MB)
003 Automating Persistence (OBJ 5 1).mp4 (9.86 MB)
004 Remote Shells (OBJ 5 1).mp4 (14.65 MB)
005 Using Remote Shells (OBJ 5 1).mp4 (20.26 MB)
006 Backdoor (OBJ 5 1).mp4 (25.69 MB)
007 Remote Access Trojans (OBJ 5 1).mp4 (13.7 MB)
008 Account Credentials (OBJ 5 1).mp4 (32.12 MB)
009 Browser-Based Persistence (OBJ 5 1).mp4 (42.74 MB)
010 Security Control Tampering (OBJ 5 1).mp4 (25.52 MB)
001 Lateral Movement (OBJ 5 2).mp4 (18.28 MB)
002 Pivoting and Relaying (OBJ 5 2).mp4 (16.65 MB)
003 Using ProxyChains (OBJ 5 2).mp4 (64.8 MB)
004 Enumerating for Lateral Movement (OBJ 5 2).mp4 (12.79 MB)
005 Service Discovery (OBJ 5 2).mp4 (29.62 MB)
006 Protocol Discovery (OBJ 5 2).mp4 (6.94 MB)
007 Remote Access Discovery (OBJ 5 2).mp4 (12.77 MB)
008 Printer Discovery (OBJ 5 2).mp4 (12.15 MB)
009 Discovering Internal Websites (OBJ 5 2).mp4 (40.79 MB)
010 Living Off the Land Tools (OBJ 5 2).mp4 (23.63 MB)
011 sshuttle (OBJ 5 2).mp4 (20.59 MB)
012 Covenant (OBJ 5 2).mp4 (40.54 MB)
001 Exfiltration (OBJ 5 3).mp4 (7.93 MB)
002 Covert Channels (OBJ 5 3).mp4 (29.29 MB)
003 Steganography (OBJ 5 3).mp4 (44.84 MB)
004 Covert Channel Using DNS (OBJ 5 3).mp4 (39.08 MB)
005 Covert Channel Using ICMP (OBJ 5 3).mp4 (16.29 MB)
006 Covert Channel Using HTTPS (OBJ 5 3).mp4 (37.72 MB)
007 Alternate Data Streams (ADS) (OBJ 5 3).mp4 (8.5 MB)
008 Exfiltrating Data (OBJ 5 3).mp4 (27.73 MB)
001 Cleanup and Restoration (OBJ 5 4).mp4 (6.45 MB)
002 Persistence Removal (OBJ 5 4).mp4 (14.97 MB)
003 Revert Configuration Changes (OBJ 5 4).mp4 (24.16 MB)
004 Created Credentials Removal (OBJ 5 4).mp4 (8.33 MB)
005 Removal of Testing Tools (OBJ 5 4).mp4 (15.61 MB)
006 Decommission Testing Infrastructure (OBJ 5 4).mp4 (10.18 MB)
007 Artifact Preservation (OBJ 5 4).mp4 (7.17 MB)
008 Secure Data Destruction (OBJ 5 4).mp4 (15.6 MB)
001 Remediation Recommendations (OBJ 1 5).mp4 (11.26 MB)
002 System Hardening (OBJ 1 5).mp4 (53.25 MB)
003 User Input Sanitization (OBJ 1 5).mp4 (19.61 MB)
004 Network and Infrastructure Controls (OBJ 1 5).mp4 (20.3 MB)
005 Authentication Recommendations (OBJ 1 5).mp4 (26.06 MB)
006 Encryption Recommendations (OBJ 1 5).mp4 (24.67 MB)
007 Patch Management (OBJ 1 5).mp4 (20.28 MB)
008 Process Level Remediation (OBJ 1 5).mp4 (17.88 MB)
009 Administrative Controls (OBJ 1 5).mp4 (101.24 MB)
010 Physical Controls (OBJ 1 5).mp4 (42.47 MB)
011 Operational Controls and Policies (OBJ 1 5).mp4 (22.73 MB)
012 Implementing Recommendations (OBJ 1 5).mp4 (22.38 MB)
001 Penetration Test Reporting (OBJ 1 4).mp4 (11.29 MB)
002 Executive Summary Process (OBJ 1 4).mp4 (14.53 MB)
003 Root Cause Analysis (OBJ 1 4).mp4 (31.88 MB)
004 Report Components (OBJ 1 2, 1 4).mp4 (32.45 MB)
005 Risk Scoring and Prioritization (OBJ 1 4).mp4 (25.96 MB)
006 Definitions in the Report (OBJ 1 4).mp4 (27.56 MB)
007 Limits and Assumptions (OBJ 1 2, 1 4).mp4 (33.7 MB)
008 Special Considerations (OBJ 1 2, 1 4).mp4 (44.84 MB)
009 Report Analysis Workshop (OBJ 1 4).mp4 (28.3 MB)
001 Conclusion.mp4 (144.05 MB)
002 BONUS What comes next.mp4 (64.08 MB)
003 Exam Tips.mp4 (18.85 MB)
001 PenTesting Overview.mp4 (13.31 MB)
002 Planning the Engagement.mp4 (23.31 MB)
003 Information Gathering.mp4 (14.3 MB)
004 Attacks and Exploits.mp4 (15.81 MB)
005 Post-Exploitation.mp4 (14.1 MB)
006 Reporting.mp4 (21.68 MB)
007 Overview of a PenTest.mp4 (67.71 MB)
001 Pre-Engagement Activities (OBJ 1 1, 1 2).mp4 (15.25 MB)
002 Regulations and Standards (OBJ 1 1, 1 2).mp4 (38.39 MB)
003 Types of Assessments (OBJ 1 1).mp4 (29.69 MB)
004 Types of Agreements.mp4 (36.41 MB)
005 Legal and Ethical Considerations (OBJ 1 1, 1 2).mp4 (24.8 MB)
006 Rules of Engagement (OBJ 1 1, 1 2).mp4 (43.21 MB)
007 Target Selection (OBJ 1 1).mp4 (29.12 MB)
008 Shared Responsibility Model (OBJ 1 1).mp4 (38.92 MB)
009 Preparing to PenTest a Cloud Provider (OBJ 1 1).mp4 (12.08 MB)
001 Frameworks (OBJ 1 3).mp4 (43.76 MB)
002 MITRE ATT&CK (OBJ 1 3).mp4 (37.05 MB)
003 OWASP (OBJ 1 3).mp4 (11.67 MB)
004 MASVS (OBJ 1 3).mp4 (9.77 MB)
005 PTES (OBJ 1 3).mp4 (23.95 MB)
006 CREST (OBJ 1 3).mp4 (21.75 MB)
007 STRIDE (OBJ 1 3).mp4 (21.37 MB)
008 OSSTMM (OBJ 1 3).mp4 (29.23 MB)
009 Purdue Model (OBJ 1 3).mp4 (10.36 MB)
010 OCTAVE (OBJ 1 3).mp4 (40.37 MB)
011 DREAD (OBJ 1 3).mp4 (26.64 MB)
012 Using the MITRE ATT&CK Framework (OBJ 1 3).mp4 (44.37 MB)
001 Information Gathering (OBJ 2 1).mp4 (14.03 MB)
002 Passive Reconnaissance (OBJ 2 1).mp4 (23.99 MB)
003 Network Sniffing (OBJ 2 1).mp4 (12.22 MB)
004 Active Reconnaissance (OBJ 2 1).mp4 (22.42 MB)
005 Port and Protocol Scanning (OBJ 2 1).mp4 (15.52 MB)
006 HTML Scraping and Cached Pages (OBJ 2 1).mp4 (8.08 MB)
007 Banner Grabbing (OBJ 2 1).mp4 (20.76 MB)
008 Conducting Banner Grabbing (OBJ 2 1).mp4 (14.75 MB)
001 Open-Source Intelligence (OSINT) (OBJ 2 1).mp4 (12.26 MB)
002 Social Media and Job Boards (OBJ 2 1).mp4 (25.68 MB)
003 Information Disclosures (OBJ 2 1).mp4 (12 MB)
004 Cryptographic Flaws (OBJ 2 1).mp4 (30.34 MB)
005 DNS Lookups (OBJ 2 1).mp4 (47.49 MB)
006 Certificate Transparency Logs (OBJ 2 1).mp4 (24.93 MB)
007 Search Engine Analysis (OBJ 2 1).mp4 (17.79 MB)
008 Conducting OSINT (OBJ 2 1).mp4 (68.73 MB)
001 Scanning and Enumeration (OBJ 2 2).mp4 (15.95 MB)
002 OS and Service Discovery (OBJ 2 2).mp4 (149.9 MB)
003 Enumerating Protocols (OBJ 2 2).mp4 (15.85 MB)
004 Enumerating DNS (OBJ 2 2).mp4 (11.54 MB)
005 Enumerating Directories (OBJ 2 2).mp4 (18.52 MB)
006 Enumerating Hosts (OBJ 2 2).mp4 (10.78 MB)
007 Enumerating Users (OBJ 2 2).mp4 (11.32 MB)
008 Enumerating Email (OBJ 2 2).mp4 (8.88 MB)
009 Enumerating Permissions (OBJ 2 2).mp4 (11.56 MB)
010 Enumerating Wireless Devices (OBJ 2 2).mp4 (34.66 MB)
011 Enumerating Secrets (OBJ 2 2).mp4 (15.55 MB)
012 Enumerating the Web (OBJ 2 2).mp4 (26.6 MB)
013 Attack Path Mapping (OBJ 2 2).mp4 (15.07 MB)
001 Reconnaissance and Enumeration Tools (OBJ 2 4).mp4 (82.07 MB)
002 Wayback Machine (OBJ 2 4).mp4 (8.28 MB)
003 theHarvester and Hunter io (OBJ 2 4).mp4 (15.31 MB)
004 OSINT Tools (OBJ 2 4, 4 8).mp4 (22.3 MB)
005 Whois and recon-ng (OBJ 2 4).mp4 (81.98 MB)
006 nslookup and dig (OBJ 2 4).mp4 (18.43 MB)
007 DNSdumpster and Amass (OBJ 2 4).mp4 (26.69 MB)
008 Shodan and Censys io (OBJ 2 4).mp4 (15.99 MB)
009 tcpdump (OBJ 2 4).mp4 (15.61 MB)
010 Wireshark (OBJ 2 4).mp4 (35.85 MB)
011 Wireless Analysis Tools (OBJ 2 4).mp4 (24.51 MB)
001 Nmap and NSE (OBJ 2 4, 4 2).mp4 (8.05 MB)
002 Nmap Discovery Scans (OBJ 2 4, 4 2).mp4 (42.05 MB)
003 Nmap Port Scans (OBJ 2 4, 4 2).mp4 (32.93 MB)
004 Nmap Fingerprinting (OBJ 2 4, 4 2).mp4 (12.92 MB)
005 Using Nmap (OBJ 2 4, 4 2).mp4 (98.09 MB)
006 Nmap Scripting Engine (OBJ 2 4, 4 2).mp4 (86 MB)
001 Scripting Basics (OBJ 2 3).mp4 (12.86 MB)
002 Shells and Programming Languages (OBJ 2 3).mp4 (63.29 MB)
003 Variables (OBJ 2 3).mp4 (16.6 MB)
004 Loops (OBJ 2 3).mp4 (8.15 MB)
005 Logic Control (OBJ 2 3).mp4 (7.68 MB)
006 Data Structures (OBJ 2 3).mp4 (42.37 MB)
007 Object Oriented Programming (OBJ 2 3).mp4 (37.28 MB)
001 Modifying Scripts (OBJ 2 3).mp4 (9.72 MB)
002 Bash Fundamentals (OBJ 2 3).mp4 (39.86 MB)
003 Understanding a Bash Script (OBJ 2 3).mp4 (10.14 MB)
004 Modifying a Bash Script (OBJ 2 3).mp4 (26.48 MB)
005 PowerShell Fundamentals (OBJ 2 3).mp4 (24.3 MB)
006 Understanding a PowerShell Script (OBJ 2 3).mp4 (10.07 MB)
007 Modifying a PowerShell Script (OBJ 2 3).mp4 (17.94 MB)
008 Python Fundamentals (OBJ 2 3).mp4 (60.6 MB)
009 Understanding a Python Script (OBJ 2 3).mp4 (8.95 MB)
010 Modifying a Python Script (OBJ 2 3).mp4 (17.27 MB)
001 Analyzing Scans (OBJ 3 2, 4 1).mp4 (14.3 MB)
002 Positive and Negative Results (OBJ 3 2).mp4 (9.37 MB)
003 Validating Scan Results (OBJ 3 2).mp4 (19.78 MB)
004 Using CVEs and CVSS (OBJ 4 1).mp4 (19.86 MB)
005 Exploit Prediction Scoring System (OBJ 4 1).mp4 (16.25 MB)
006 Target Prioritization (OBJ 4 1).mp4 (17.38 MB)
007 Common Target Criteria (OBJ 4 1).mp4 (22.97 MB)
008 Scripting for Result Validation (OBJ 3 2).mp4 (9.27 MB)
009 Scan Validations (OBJ 3 2).mp4 (31.08 MB)
010 Capability Selection (OBJ 3 2, 4 1).mp4 (10.72 MB)
011 Documenting the Attack (OBJ 4 1).mp4 (12.59 MB)
012 Other Attack Considerations (OBJ 4 1).mp4 (43.06 MB)
001 Discovering Vulnerabilities (OBJ 3 1).mp4 (10.04 MB)
002 Application Scanning (OBJ 3 1).mp4 (31.6 MB)
003 Software Analysis (OBJ 3 1).mp4 (26.38 MB)
004 Host-Based Scanning (OBJ 3 1).mp4 (26.68 MB)
005 Network Scanning (OBJ 3 1).mp4 (18 MB)
006 Mobile Scanning (OBJ 3 1).mp4 (11.9 MB)
007 Container Scanning (OBJ 3 1).mp4 (22.4 MB)
008 Scanning IaC (OBJ 3 1).mp4 (29.47 MB)
009 ICS Vulnerability Discovery (OBJ 3 1).mp4 (16.31 MB)
010 Wireless Scans (OBJ 3 1).mp4 (14.73 MB)
011 Static Code Analysis (SonarQube) (OBJ 3 1).mp4 (21.21 MB)
001 Vulnerability Discovery Tools (OBJ 3 1).mp4 (6.78 MB)
002 Nikto (OBJ 3 1).mp4 (66.74 MB)
003 GreenboneOpenVAS (OBJ 3 1).mp4 (79.99 MB)
004 Trivy (OBJ 3 1).mp4 (18.55 MB)
005 BloodHound (OBJ 3 1).mp4 (28.15 MB)
006 PowerSploit (OBJ 3 1).mp4 (3.52 MB)
007 Grype (OBJ 3 1).mp4 (6.68 MB)
008 Kube-Hunter (OBJ 3 1).mp4 (25.14 MB)
009 TruffleHog (OBJ 3 1).mp4 (16.75 MB)
001 Social Engineering Attacks (OBJ 4 8).mp4 (19.63 MB)
002 Methods of Influence (OBJ 4 8).mp4 (81.54 MB)
003 Phishing Campaigns (OBJ 4 8).mp4 (34.24 MB)
004 Using the Social Engineering Toolkit (SET) (OBJ 4 8).mp4 (39.13 MB)
005 Gophish (OBJ 4 8).mp4 (16.96 MB)
006 Impersonation (OBJ 4 8).mp4 (41.34 MB)
007 Surveillance Techniques (OBJ 4 8).mp4 (16.54 MB)
008 Watering Hole (OBJ 4 8).mp4 (9.69 MB)
009 Evilginx (OBJ 4 8).mp4 (31.69 MB)
010 Tailgating and Piggybacking (OBJ 4 8).mp4 (23.23 MB)
011 Browser Exploitation Framework (BeEF) (OBJ 4 8).mp4 (20.43 MB)
001 Wireless Attacks (OBJ 4 7).mp4 (12.18 MB)
002 Wireless Security (OBJ 4 7).mp4 (114.67 MB)
003 Wireless Signal Exploitation (OBJ 4 7).mp4 (31.55 MB)
004 Aircrack-ng (OBJ 4 7).mp4 (25.41 MB)
005 Wireless Hacking (OBJ 4 7).mp4 (55.95 MB)
006 WPS PIN Attacks (OBJ 4 7).mp4 (132 MB)
007 Captive Portal Attacks (OBJ 4 7).mp4 (32.95 MB)
008 Evil Twin (OBJ 4 7).mp4 (9.97 MB)
009 Kismet (OBJ 4 7).mp4 (27.81 MB)
010 Wi-Fi Protocol Fuzzing (OBJ 4 7).mp4 (22.52 MB)
001 Network Attacks (OBJ 4 2, 4 3, 4 5).mp4 (23.19 MB)
002 Stress Testing (OBJ 4 2).mp4 (36.35 MB)
003 Bypassing Segmentation (OBJ 4 2).mp4 (31.42 MB)
004 MAC Spoofing (OBJ 4 2).mp4 (38.68 MB)
005 NAC Bypass (OBJ 4 2).mp4 (30.16 MB)
006 Session-Based Attacks (OBJ 4 2).mp4 (9.47 MB)
007 Service Exploitation (OBJ 4 2).mp4 (20.41 MB)
008 Packet Crafting (OBJ 4 2).mp4 (19.31 MB)
009 Netcat (OBJ 4 2).mp4 (33 MB)
010 Using Netcat (OBJ 4 2).mp4 (24.21 MB)
011 Default Network Credentials (OBJ 4 2).mp4 (28.37 MB)
012 LLMNRNBT-NS Poisoning (OBJ 4 2).mp4 (16.09 MB)
013 ARP Poisoning (OBJ 4 2).mp4 (34.16 MB)
014 Intro to Metasploit (OBJ 4 2).mp4 (17.89 MB)
001 Authentication Attacks (OBJ 4 2, 4 3, 4 5).mp4 (41.32 MB)
002 Types of Password Attack (OBJ 4 3).mp4 (7.59 MB)
003 Password Cracking Tools (OBJ 4 3).mp4 (72.14 MB)
004 Credential Attacks (OBJ 4 3).mp4 (28.2 MB)
005 Credential Passing Attacks (OBJ 4 3).mp4 (23.14 MB)
006 Directory Service Attacks (OBJ 4 2, 4 3).mp4 (19.32 MB)
007 CrackMapExec (CME) (OBJ 4 3).mp4 (16.73 MB)
008 SAML Attacks (OBJ 4 3).mp4 (24.43 MB)
009 OpenID Connect (OIDC) Attacks (OBJ 4 3).mp4 (15.36 MB)
010 Hash Attacks (OBJ 4 5).mp4 (17.62 MB)
001 Host Attacks (OBJ 4 4).mp4 (14.93 MB)
002 Privilege Escalation (OBJ 4 4).mp4 (35.35 MB)
003 Conducting Privilege Escalation (OBJ 4 4).mp4 (179.48 MB)
004 Credential Harvesting (OBJ 4 4).mp4 (13.59 MB)
005 Misconfigured Endpoints (OBJ 4 4).mp4 (18.17 MB)
006 Unquoted Service Paths (OBJ 4 4).mp4 (16.65 MB)
007 Disabling Security Software (OBJ 4 4).mp4 (31.35 MB)
008 Payload Obfuscation (OBJ 4 4).mp4 (12.72 MB)
009 User-Controlled Access Bypass (OBJ 4 4).mp4 (64.29 MB)
010 Shell and Kiosk Escapes (OBJ 4 4).mp4 (21.86 MB)
011 Library and Process Injection (OBJ 4 4).mp4 (70.15 MB)
012 Log Tampering (OBJ 4 4).mp4 (6.53 MB)
013 Living Off the Land (OBJ 4 4).mp4 (6.58 MB)
001 Web Application Vulnerabilities (OBJ 4 3, 4 5).mp4 (33.18 MB)
002 Race Conditions (OBJ 4 5).mp4 (23.56 MB)
003 Buffer Overflows (OBJ 4 5).mp4 (63.76 MB)
004 Buffer Overflow Attacks (OBJ 4 5).mp4 (27.62 MB)
005 Authentication Flaws and Insecure References (OBJ 4 5).mp4 (39.61 MB)
006 Improper Error Handling (OBJ 4 5).mp4 (15.25 MB)
007 Improper Headers (OBJ 4 5).mp4 (25.59 MB)
008 Code Signing (OBJ 4 5).mp4 (13.73 MB)
009 Vulnerable Components (OBJ 4 5).mp4 (88.83 MB)
010 Software Composition (OBJ 4 5).mp4 (87.67 MB)
001 Web Application Attacks (OBJ 4 5).mp4 (74.04 MB)
002 Directory Traversals (OBJ 4 5).mp4 (43.03 MB)
003 Directory Traversal Tools (OBJ 4 5).mp4 (40.38 MB)
004 Cross-Site Scripting (XSS) (OBJ 4 5).mp4 (19.35 MB)
005 Request Forgeries (OBJ 4 5).mp4 (21.09 MB)
006 SQL Injections (OBJ 4 5).mp4 (37.2 MB)
007 Performing SQL Injection Attacks (OBJ 4 3, 4 5).mp4 (72.18 MB)
008 Injection Attacks (OBJ 4 5).mp4 (13.11 MB)
009 File Inclusions (OBJ 4 5).mp4 (9.61 MB)
010 Arbitrary Code Execution (OBJ 4 5).mp4 (31.29 MB)
011 Web Application Session Hijacking (OBJ 4 5).mp4 (31.7 MB)
012 Abusing APIs (OBJ 4 5).mp4 (38.24 MB)
013 OWASP ZAP (OBJ 4 5).mp4 (23.84 MB)
014 Attacking Web Applications (OBJ 4 5).mp4 (145.48 MB)
001 Cloud Attacks (OBJ 4 6 ).mp4 (9.74 MB)
002 Identity and Access Management (IAM) Misconfigurations (OBJ 4 6 ).mp4 (28.39 MB)
003 Resource Misconfigurations (OBJ 4 6 ).mp4 (35.05 MB)
004 Logging Information Exposures (OBJ 4 6 ).mp4 (27.04 MB)
005 Metadata Service Attacks (OBJ 4 6 ).mp4 (46.7 MB)
006 Image and Artifact Tampering (OBJ 4 6 ).mp4 (41.79 MB)
007 Supply Chain Attacks (OBJ 4 6 ).mp4 (48.49 MB)
008 Container Exploits and Attacks (OBJ 4 6 ).mp4 (25.14 MB)
009 Trust Relationship Abuse (OBJ 4 6 ).mp4 (39.63 MB)
010 Third-party Integration Exploits (OBJ 4 6 ).mp4 (56.58 MB)
011 Cloud Security Testing (OBJ 4 6 ).mp4 (34.76 MB)
012 Conducting Cloud Audits (OBJ 4 6 ).mp4 (86.18 MB)
001 Attacking Specialized Systems (OBJ 4 9).mp4 (8.52 MB)
002 Mobile Device Attacks (OBJ 4 9).mp4 (82.7 MB)
003 Tools for Mobile Device Attacks (OBJ 4 9).mp4 (30.77 MB)
004 Bluetooth Attacks (OBJ 4 9).mp4 (11.13 MB)
005 NFC and RFID Attacks (OBJ 4 9).mp4 (17.23 MB)
006 AI Attacks (OBJ 4 9).mp4 (39.86 MB)
007 Operational Technology (OT) (OBJ 4 9).mp4 (32.36 MB)
008 OT Attacks (OBJ 4 9).mp4 (81.29 MB)
009 Testing OT Systems (OBJ 4 9).mp4 (12.31 MB)
001 Automated Attacks (OBJ 4 10).mp4 (13.27 MB)
002 Automating Attacks with Bash (OBJ 4 10).mp4 (11.54 MB)
003 EmpirePowerSploit (OBJ 4 10).mp4 (21.02 MB)
004 PowerView (OBJ 4 10).mp4 (7.1 MB)
005 PowerUpSQL (OBJ 4 10).mp4 (33.88 MB)
006 AD Search (OBJ 4 10).mp4 (22.41 MB)
007 Impacket (OBJ 4 10).mp4 (13.03 MB)
008 Scapy (OBJ 4 10).mp4 (28.52 MB)
009 Caldera (OBJ 4 10).mp4 (34.73 MB)
010 Infection Monkey (OBJ 4 10).mp4 (19.69 MB)
011 Atomic Red Team (OBJ 4 10).mp4 (12.07 MB)
001 Persistence (OBJ 5 1).mp4 (15.22 MB)
002 Command and Control (OBJ 5 1).mp4 (11.48 MB)
003 Automating Persistence (OBJ 5 1).mp4 (9.86 MB)
004 Remote Shells (OBJ 5 1).mp4 (14.65 MB)
005 Using Remote Shells (OBJ 5 1).mp4 (20.26 MB)
006 Backdoor (OBJ 5 1).mp4 (25.69 MB)
007 Remote Access Trojans (OBJ 5 1).mp4 (13.7 MB)
008 Account Credentials (OBJ 5 1).mp4 (32.12 MB)
009 Browser-Based Persistence (OBJ 5 1).mp4 (42.74 MB)
010 Security Control Tampering (OBJ 5 1).mp4 (25.52 MB)
001 Lateral Movement (OBJ 5 2).mp4 (18.28 MB)
002 Pivoting and Relaying (OBJ 5 2).mp4 (16.65 MB)
003 Using ProxyChains (OBJ 5 2).mp4 (64.8 MB)
004 Enumerating for Lateral Movement (OBJ 5 2).mp4 (12.79 MB)
005 Service Discovery (OBJ 5 2).mp4 (29.62 MB)
006 Protocol Discovery (OBJ 5 2).mp4 (6.94 MB)
007 Remote Access Discovery (OBJ 5 2).mp4 (12.77 MB)
008 Printer Discovery (OBJ 5 2).mp4 (12.15 MB)
009 Discovering Internal Websites (OBJ 5 2).mp4 (40.79 MB)
010 Living Off the Land Tools (OBJ 5 2).mp4 (23.63 MB)
011 sshuttle (OBJ 5 2).mp4 (20.59 MB)
012 Covenant (OBJ 5 2).mp4 (40.54 MB)
001 Exfiltration (OBJ 5 3).mp4 (7.93 MB)
002 Covert Channels (OBJ 5 3).mp4 (29.29 MB)
003 Steganography (OBJ 5 3).mp4 (44.84 MB)
004 Covert Channel Using DNS (OBJ 5 3).mp4 (39.08 MB)
005 Covert Channel Using ICMP (OBJ 5 3).mp4 (16.29 MB)
006 Covert Channel Using HTTPS (OBJ 5 3).mp4 (37.72 MB)
007 Alternate Data Streams (ADS) (OBJ 5 3).mp4 (8.5 MB)
008 Exfiltrating Data (OBJ 5 3).mp4 (27.73 MB)
001 Cleanup and Restoration (OBJ 5 4).mp4 (6.45 MB)
002 Persistence Removal (OBJ 5 4).mp4 (14.97 MB)
003 Revert Configuration Changes (OBJ 5 4).mp4 (24.16 MB)
004 Created Credentials Removal (OBJ 5 4).mp4 (8.33 MB)
005 Removal of Testing Tools (OBJ 5 4).mp4 (15.61 MB)
006 Decommission Testing Infrastructure (OBJ 5 4).mp4 (10.18 MB)
007 Artifact Preservation (OBJ 5 4).mp4 (7.17 MB)
008 Secure Data Destruction (OBJ 5 4).mp4 (15.6 MB)
001 Remediation Recommendations (OBJ 1 5).mp4 (11.26 MB)
002 System Hardening (OBJ 1 5).mp4 (53.25 MB)
003 User Input Sanitization (OBJ 1 5).mp4 (19.61 MB)
004 Network and Infrastructure Controls (OBJ 1 5).mp4 (20.3 MB)
005 Authentication Recommendations (OBJ 1 5).mp4 (26.06 MB)
006 Encryption Recommendations (OBJ 1 5).mp4 (24.67 MB)
007 Patch Management (OBJ 1 5).mp4 (20.28 MB)
008 Process Level Remediation (OBJ 1 5).mp4 (17.88 MB)
009 Administrative Controls (OBJ 1 5).mp4 (101.24 MB)
010 Physical Controls (OBJ 1 5).mp4 (42.47 MB)
011 Operational Controls and Policies (OBJ 1 5).mp4 (22.73 MB)
012 Implementing Recommendations (OBJ 1 5).mp4 (22.38 MB)
001 Penetration Test Reporting (OBJ 1 4).mp4 (11.29 MB)
002 Executive Summary Process (OBJ 1 4).mp4 (14.53 MB)
003 Root Cause Analysis (OBJ 1 4).mp4 (31.88 MB)
004 Report Components (OBJ 1 2, 1 4).mp4 (32.45 MB)
005 Risk Scoring and Prioritization (OBJ 1 4).mp4 (25.96 MB)
006 Definitions in the Report (OBJ 1 4).mp4 (27.56 MB)
007 Limits and Assumptions (OBJ 1 2, 1 4).mp4 (33.7 MB)
008 Special Considerations (OBJ 1 2, 1 4).mp4 (44.84 MB)
009 Report Analysis Workshop (OBJ 1 4).mp4 (28.3 MB)
001 Conclusion.mp4 (144.05 MB)
002 BONUS What comes next.mp4 (64.08 MB)
Screenshot
AusFile
Code:
Bitte
Anmelden
oder
Registrieren
um Code Inhalt zu sehen!
Code:
Bitte
Anmelden
oder
Registrieren
um Code Inhalt zu sehen!
Code:
Bitte
Anmelden
oder
Registrieren
um Code Inhalt zu sehen!
Code:
Bitte
Anmelden
oder
Registrieren
um Code Inhalt zu sehen!
Code:
Bitte
Anmelden
oder
Registrieren
um Code Inhalt zu sehen!
Code:
Bitte
Anmelden
oder
Registrieren
um Code Inhalt zu sehen!