RTFM Video Library

dkmdkm

U P L O A D E R
9f7ff9342da1201b5e46b70f6fc6d9ad.jpg

Free Download RTFM Video Library
MP4 | Video: H264 3840x2160 | Audio: AAC 44100Hz 2 Ch
Language: English | Duration: 8hrs 22min | Size: 9.89 GB
Meet the field manuals that started it all. Cybersecurity is tough enough without having to memorize each and every complicated command. Join the thousands of cyber security professionals who utilize the RTFM or BTFM everyday.
Content

0: Welcome
0.1 Welcome! (1 min)
0.2 How to use the RTFM Video Library (1.5 mins)
0.3 Red Team Scenario Overview (3 mins)
1: Infrastructure Setup
1.1 SSH (7 mins)
1.2 Setup SSH Keys (9.5 mins)
1.3 SSH Forwarding/Tunneling (15 mins)
1.4 TCPDump & TCPReplay (11 mins)
1.5 Screen (5.5 mins)
1.6 IPTables - (8.5 mins)
1.7 Service Manipulation - (5.5 mins)
1.2 Scenario: Infrastructure Setup - (21.5 mins)
2: Initial Access
2.1 Windows OS Details (2 min)
2.2 Windows Administrative Binaries (5.5 min)
2.3 Environmental Variables (4 min)
2.4 Windows Key Files & Locations (7 min)
2.5 Registry Run Keys (6 min)
3: Situational Awareness
3.1 Operating System Information (9 min)
3.2 Process & Service Enumeration (4 min)
3.3 Windows Account Enumeration (2.5 min)
3.4 Network Info & Configuration (10.5 min)
3.5 Registry Commands & Important Keys (10 min)
Windows Active Directory Overview (10 min)
3.6 Scenario: Situational Awareness (7.5 min)
4: User Level Persistence
4.0 User Level Persistence Overview (4 min)
4.1 Scheduled Task User Persistence (13 min)
4.2 Run Key User Persistence (7 min)
4.3 Startup Directories (6.5 min)
4.4 Poisoning Existing Scripts (8.5 min)
4.5 Scenario: User Level Persistence (16 min)
5: Escalation
5.0 Windows Privilege Escalation Checklist (3 min)
5.1 File Info & Searching (8 min)
5.2 Tree Filesystem to Searchable File (7.5 min)
5.3 Using Volume Shadow Service (VSS) (5.5 min)
5.4 Scenario: Escalation via Datamining (22 min)
6: Lateral Movement
6.1 Remote System Enumeration (6 min)
6.2 sc.exe remote execution (7 min)
6.3 MMC COM Object (2 min)
6.4 Remote schtasks Execution (5 min)
6.5 Scenario: Remote Execution on Domain Controller (9 min)
7: Active Directory Enumeration
7.1 Domain Enumeration with Net.exe (6.5 min)
7.2 Domain Enumeration with DSQuery (16.5 min)
8: Domain Fortification
8.1 Mimikatz Credential Manipulation (7.5 min)
8.2 Scenario: Fortifying Domain Access (10 min)
8.3 Schtasks on Boot (3.5 min)
8.4 Service Creation (9 min)
8.5 Windows 10 .dll Hijack (9 min)
8.6 Remote Desktop Protocol (RDP) Configuration (5 min)
8.7 Misc[Re]Configuration (5.5 min)
8.8 Scenario: Installing System Persistence (3.5 min)
9: Hunting for User Workstations
9.1 Finding User System in a Windows Domain (5.5 min)
9.2 Scenario: Hunting for User Workstations (7 min)
10: Active Directory Forest Compromise
10.1 Scenario: Active Directory Forest Compromise Part 1 (40 min)
10.2 Scenario: Active Directory Forest Compromise Part 2 (11.5 min)
11: Secret Enclave Compromise
11.1 Linux OS Details - File System Structure (8 min)
11.2 Linux OS Details - Important File/Directory Descriptions (8 min)
11.3 Linux OS Details - /etc/shadow & /etc/passed Hash and File formats (3 min)
11.4 Linux System Enumeration - Operating System Information (3.5 min)
11.5 Linux System Enumeration - Situational Awareness & Process Manipulation (6 min)
11.6 Linux System Enumeration - User Account Enumeration & Configuration (4.5 min)
11.7 Linux System Enumeration - Network Configuration (5.5 min)
11.8: Linux Post Exploitation - Bash History Manipulation (3.5 min)
11.9 Linux File Manipulation (8 min)
11.10 Linux File Manipulation - File Compression & Chunking & Hashing (4.5 min)
11.11 Linux Persistence - Linux Service (3 min)
11.12 Linux Persistence - Crontab (2 min)
11.13 Linux Persistence - Poisoning Existing Scripts (1 min)
12: Pivoting through Tunnels
12.1 Scenario: Linux Escalation, Pulling the Thread (5.5 min)
12.2 Scenario: Accessing the Vault (6 min)
Homepage
Code:
Bitte Anmelden oder Registrieren um Code Inhalt zu sehen!
-------Welcome to my Blogs--------
Do not forget to check it every day!
If You should find any files not found, please PM me
If You Love My Courses So You Buy Premium Account From My Link To Support Me !!!!!!




Recommend Download Link Hight Speed | Please Say Thanks Keep Topic Live
Code:
Bitte Anmelden oder Registrieren um Code Inhalt zu sehen!
No Password - Links are Interchangeable
 
Kommentar

In der Börse ist nur das Erstellen von Download-Angeboten erlaubt! Ignorierst du das, wird dein Beitrag ohne Vorwarnung gelöscht. Ein Eintrag ist offline? Dann nutze bitte den Link  Offline melden . Möchtest du stattdessen etwas zu einem Download schreiben, dann nutze den Link  Kommentieren . Beide Links findest du immer unter jedem Eintrag/Download.

Data-Load.me | Data-Load.ing | Data-Load.to | Data-Load.in

Auf Data-Load.me findest du Links zu kostenlosen Downloads für Filme, Serien, Dokumentationen, Anime, Animation & Zeichentrick, Audio / Musik, Software und Dokumente / Ebooks / Zeitschriften. Wir sind deine Boerse für kostenlose Downloads!

Ist Data-Load legal?

Data-Load ist nicht illegal. Es werden keine zum Download angebotene Inhalte auf den Servern von Data-Load gespeichert.
Oben Unten