![]() |
|
NetWork Penetration Testing Essentials (PEN-100) - Erik Choron (Feb 2025) - Printable Version +- Softwarez.Info - Software's World! (https://softwarez.info) +-- Forum: Library Zone (https://softwarez.info/Forum-Library-Zone) +--- Forum: Video Tutorials (https://softwarez.info/Forum-Video-Tutorials) +--- Thread: NetWork Penetration Testing Essentials (PEN-100) - Erik Choron (Feb 2025) (/Thread-NetWork-Penetration-Testing-Essentials-PEN-100-Erik-Choron-Feb-2025) |
NetWork Penetration Testing Essentials (PEN-100) - Erik Choron (Feb 2025) - AD-TEAM - 04-02-2025 ![]() 18.97 GB | 00:09:34 | mp4 | 1920X1080 | 16:9 Genre:eLearning |Language:English
Files Included :
1 Adding more to our security toolkit (184.89 MB) 10 Challenge (68.66 MB) 2 What will Pen-100 cover (261.15 MB) 3 Building Blocks (213.42 MB) 4 Understanding Virtualization (71.64 MB) 5 Type 1 and Type 2 (66.17 MB) 6 Type 2 (33.57 MB) 7 We need permission! (119.22 MB) 8 We need permission! Part 2 (61.97 MB) 9 We need permission! Part 3 (38.26 MB) 1 Baby steps before running (118.5 MB) 10 Solution (236.81 MB) 2 pseudocode (356.47 MB) 3 Where do we script at (275.89 MB) 4 Where do we script at Part 2 (78.23 MB) 5 For Loop (115.45 MB) 6 Using our loop knowledge to check the network (208.44 MB) 7 Saving our work (58.08 MB) 8 Scripting for more details (112.36 MB) 9 Challenge (112.58 MB) 1 Let's learn another loop (89.67 MB) 10 Solution (141.16 MB) 2 Python requirements (109.99 MB) 3 Why Python (109.56 MB) 4 Why Python Part 2 (255.38 MB) 5 Remember Environment Variables (82.7 MB) 6 Scanning with Python (201.13 MB) 7 What's Scapy (225.51 MB) 8 What's the difference between the two (153.32 MB) 9 Challenge (131.54 MB) 1 Introduction (153.32 MB) 2 Bash (89.4 MB) 3 Scripting in Bash (86.84 MB) 4 Scripting in Bash Part 2 (51.06 MB) 5 Making sure we stay in Bash (64.45 MB) 6 Creating a program to run in Bash (70.07 MB) 7 Creating a program to run in Bash Part 2 (86.76 MB) 8 Challenge (48.74 MB) 9 Solution (82.86 MB) 1 Kali being used for good (149.07 MB) 10 Challenge (87.65 MB) 11 Solution (44.45 MB) 2 Kali being used for good Part 2 (96.45 MB) 3 Kali being used for good (48.98 MB) 4 Monitoring and discovering networks Part 1 (64.08 MB) 5 Monitoring and discovering networks Part 2 (18.81 MB) 6 Monitoring and discovering networks Part 3 (40.2 MB) 7 Monitoring and discovering networks Part 4 (52.24 MB) 8 Monitoring for hidden networks (131.15 MB) 9 Monitoring for hidden networks Part 2 (84.74 MB) 1 Metasploit Framework (165.66 MB) 2 Metasploit on Kali (350.9 MB) 3 Systems Without Metasploit (345.83 MB) 4 How to Prep the Target (203.1 MB) 5 Other Metasploit Add-Ins (176.51 MB) 6 Options Outside of Metasploit (164.01 MB) 1 Cryptography Overview (155.18 MB) 2 Synchronous Crypto (219.71 MB) 3 Synchronous Crypto Examples (323.73 MB) 4 Asynchronous Crypto (215.63 MB) 5 Asynchronous Crypto Example (300.05 MB) 6 Cryptography Review (36.78 MB) 1 Knowing our targets (143.9 MB) 2 Web Application Backbone (100.88 MB) 3 Web Application Backbone Part 2 (87.35 MB) 4 POSIX-Based - Apache (69.06 MB) 5 POSIX-Based - Apache Part 2 (27.93 MB) 6 Discovering Web Application use on a target (76.59 MB) 7 Challenge (35.98 MB) 8 Solution (135.89 MB) 1 What is Active Directory (170.48 MB) 2 Installing Active Directory (74.51 MB) 3 Post Install (73.28 MB) 4 Post Install Part 2 (16.17 MB) 5 User and Group information (66.48 MB) 6 Policy Enforcement (53.52 MB) 7 Challenge (28.68 MB) 8 Solution (114.26 MB) 1 What is Kali (59.63 MB) 2 What is Kali Part 2 (60.07 MB) 3 Picking our Kali (60.34 MB) 4 Picking our Kali Part 2 (63.53 MB) 5 Downloading and installing Kali (96.09 MB) 6 Downloading and installing Kali Part 2 (71.88 MB) 7 Live Kali (68.68 MB) 8 Challenge (38.15 MB) 9 Solution (46.99 MB) 1 POSIX-Based Systems (135.75 MB) 10 Challenge (50.46 MB) 11 Solution (72.87 MB) 2 Formatting (147.12 MB) 3 Formatting Part 2 (98.33 MB) 4 Directory Structure (312.46 MB) 5 Missing File Types (216.91 MB) 6 File Permissions (291.96 MB) 7 Usernames and Passwords (296.62 MB) 8 Services and Logs (156.32 MB) 9 Services (218.65 MB) 1 Getting to know Windows (127.59 MB) 2 Formatting (82.04 MB) 3 Formatting Part 2 (29.1 MB) 4 Directory Structuring (81.73 MB) 5 Directory Structuring Part 2 (30.68 MB) 6 File Types (79.81 MB) 7 Username and Passwords (110.72 MB) 8 Challenge (32.5 MB) 9 Solution (45.11 MB) 1 Getting into the Windows Operating System (190.44 MB) 10 Challenge (36.48 MB) 11 Solution (109.09 MB) 2 Local Security Policy (298.92 MB) 3 Local Security Policy Part 2 (271.45 MB) 4 Registry (321.21 MB) 5 Registry Part 2 (210.05 MB) 6 Temporary and Hidden Folders (240.95 MB) 7 Disk Management (111.11 MB) 8 Services and Logs (172.48 MB) 9 Logging (249.63 MB) 1 Linux Networking (124.16 MB) 2 ifconfig (87.94 MB) 3 Where did those interfaces come from (25.67 MB) 4 DNS Configuration (43.94 MB) 5 Routing Configuration (61.06 MB) 6 iptables (95.53 MB) 7 GUI help (17.06 MB) 8 Challenge (39.49 MB) 9 Solution (38.44 MB) 1 Windows Networking (64.57 MB) 10 Solution (87.62 MB) 2 Looping back (223.58 MB) 3 Hardware in VMWare (338.01 MB) 4 Windows PowerShell (303.98 MB) 5 Wireshark (409.65 MB) 6 promisc (110 MB) 7 Windows Firewall (180.51 MB) 8 Wireshark (143.19 MB) 9 Challenge (17.4 MB) 1 Understanding how the network talks (123.85 MB) 10 Bonus video (163.7 MB) 2 Scoping things out (52.7 MB) 3 Scoping things out part 2 (85.05 MB) 4 Capturing some traffic (51.1 MB) 5 Wireshark (116.51 MB) 6 tcpdump (55.83 MB) 7 Active and passive listening (74.03 MB) 8 Challenge (21.84 MB) 9 Solution (32.44 MB) 1 Wireless Networks (229.19 MB) 10 Solution (48.51 MB) 2 Heat mapping (115.81 MB) 3 Addendum (184.77 MB) 4 Wireless Channels and Rogue Access Points (46.54 MB) 5 Going Rogue (235.12 MB) 6 Wireless Promiscuous (62.74 MB) 7 Kismet (69.17 MB) 8 Kismet Part 2 (66.84 MB) 9 Challenge (7.44 MB)] Screenshot ![]() |