08-30-2024, 01:31 PM
402.65 MB | 00:09:32 | mp4 | 1276X720 | 16:9
Genre:eLearning |Language:English
Files Included :
01 - Establishing a solid foundation to progress into a career of penetration testing (4.74 MB)
02 - What you should know (926.59 KB)
03 - Disclaimer (1.52 MB)
01 - Pen testing overview (11.8 MB)
02 - The cyber kill chain (9.69 MB)
03 - The MITRE ATT&CK repository (8.07 MB)
01 - Scanning networks with Nmap (16.65 MB)
02 - A netcat refresher (9.6 MB)
03 - Capturing packets with tcpdump (36.32 MB)
04 - Work with netstat, nbtstat, and arp (6.85 MB)
05 - Scripting with PowerShell (14.9 MB)
06 - Extending PowerShell with Nishang (14.03 MB)
07 - What is Active Directory (9.94 MB)
08 - Analyze Active Directory with BloodHound (13.2 MB)
01 - Refreshing your Bash skills (6.34 MB)
02 - Controlling the flow in a script (4.33 MB)
03 - Using functions in bash (3.82 MB)
01 - Refresh your Python skills (16.75 MB)
02 - Use the system functions (2.28 MB)
03 - Use networking functions (3.45 MB)
04 - Work with websites (7.61 MB)
05 - Access SQLite databases (4.2 MB)
06 - Using Scapy to work with packets (2.28 MB)
07 - Leveraging OpenAI for testing (8.36 MB)
01 - A Kali refresher (7.81 MB)
02 - Fuzzing with Spike (8.6 MB)
03 - Information gathering with Legion (4.99 MB)
04 - Using Metasploit (15.08 MB)
05 - Scan targets with GVM (11.04 MB)
01 - Approach web testing (4.98 MB)
02 - Test websites with Burp Suite (8.3 MB)
03 - Check web servers with Nikto (2.17 MB)
04 - Fingerprint web servers (11.18 MB)
05 - Web server penetration using sqlmap (15.95 MB)
01 - Exploit a target (11.63 MB)
02 - Finding caves for code injection (13.29 MB)
03 - Understand code injection (23.13 MB)
04 - Understand command injection (4.23 MB)
05 - Understand buffer overflows (29.78 MB)
06 - Password spraying Active Directory (3.13 MB)
07 - Find exploit code (6.67 MB)
01 - What's next (2.6 MB)
01 - Establishing a solid foundation to progress into a career of penetration testing (4.74 MB)
02 - What you should know (926.59 KB)
03 - Disclaimer (1.52 MB)
01 - Pen testing overview (11.8 MB)
02 - The cyber kill chain (9.69 MB)
03 - The MITRE ATT&CK repository (8.07 MB)
01 - Scanning networks with Nmap (16.65 MB)
02 - A netcat refresher (9.6 MB)
03 - Capturing packets with tcpdump (36.32 MB)
04 - Work with netstat, nbtstat, and arp (6.85 MB)
05 - Scripting with PowerShell (14.9 MB)
06 - Extending PowerShell with Nishang (14.03 MB)
07 - What is Active Directory (9.94 MB)
08 - Analyze Active Directory with BloodHound (13.2 MB)
01 - Refreshing your Bash skills (6.34 MB)
02 - Controlling the flow in a script (4.33 MB)
03 - Using functions in bash (3.82 MB)
01 - Refresh your Python skills (16.75 MB)
02 - Use the system functions (2.28 MB)
03 - Use networking functions (3.45 MB)
04 - Work with websites (7.61 MB)
05 - Access SQLite databases (4.2 MB)
06 - Using Scapy to work with packets (2.28 MB)
07 - Leveraging OpenAI for testing (8.36 MB)
01 - A Kali refresher (7.81 MB)
02 - Fuzzing with Spike (8.6 MB)
03 - Information gathering with Legion (4.99 MB)
04 - Using Metasploit (15.08 MB)
05 - Scan targets with GVM (11.04 MB)
01 - Approach web testing (4.98 MB)
02 - Test websites with Burp Suite (8.3 MB)
03 - Check web servers with Nikto (2.17 MB)
04 - Fingerprint web servers (11.18 MB)
05 - Web server penetration using sqlmap (15.95 MB)
01 - Exploit a target (11.63 MB)
02 - Finding caves for code injection (13.29 MB)
03 - Understand code injection (23.13 MB)
04 - Understand command injection (4.23 MB)
05 - Understand buffer overflows (29.78 MB)
06 - Password spraying Active Directory (3.13 MB)
07 - Find exploit code (6.67 MB)
01 - What's next (2.6 MB)
Screenshot