MuerBT磁力搜索 BT种子搜索利器 免费下载BT种子,超5000万条种子数据

CompTIA Pentest+ (Ethical Hacking) Course & Practice Exam - Jason Dion

磁力链接/BT种子名称

CompTIA Pentest+ (Ethical Hacking) Course & Practice Exam - Jason Dion

磁力链接/BT种子简介

种子哈希:135ec2a9e270c7356545a1c69c91c5d49d946198
文件大小: 11.45G
已经下载:638次
下载速度:极快
收录时间:2023-12-28
最近下载:2025-08-15

移花宫入口

移花宫.com邀月.com怜星.com花无缺.comyhgbt.icuyhgbt.top

磁力链接下载

magnet:?xt=urn:btih:135EC2A9E270C7356545A1C69C91C5D49D946198
推荐使用PIKPAK网盘下载资源,10TB超大空间,不限制资源,无限次数离线下载,视频在线观看

下载BT种子文件

磁力链接 迅雷下载 PIKPAK在线播放 世界之窗 91视频 含羞草 欲漫涩 逼哩逼哩 成人快手 51品茶 抖阴破解版 极乐禁地 91短视频 她趣 TikTok成人版 PornHub 听泉鉴鲍 草榴社区 哆哔涩漫 呦乐园 萝莉岛

最近搜索

初中生儿子 欧美大屁股 风中有朵雨做的云 林一 交换游戏 小初合集—幼萝 熟妇喷水 日本 伦理 药兜兜 韩敏 猎魔人+第三季 cmn-136 nkkd-356c 身材简直太完美 新疆妹 fc2-ppv-3629201 探花鼻祖合集 小野坂唯香空姐 tina很妖孽呀+–+碧蓝航线+建武 俄罗斯 黑丝 +lada 香蕉傳媒 사옥미팅 撸点极高合集 唐门 玩游戏 输了 怀孕绿主 sabaku 寂寞小骚 磁力链接搜索

文件列表

  • 01 - Welcome to the Course (PT0-002)/001 Welcome.mp4 286.4 MB
  • 08 - Social Engineering and Physical Attacks (PT0-002)/009 Physical Security (OBJ 3.6).mp4 209.1 MB
  • 11 - Application Vulnerabilities (PT0-002)/012 Conducting Privilege Escalation (OBJ 3.3).mp4 197.4 MB
  • 05 - Active Reconnaissance (PT0-002)/011 Network Traffic Analysis (OBJ 2.3).mp4 178.8 MB
  • 07 - Nmap (PT0-002)/006 Nmap Scripting Engine (OBJ 2.3 and 2.4).mp4 178.6 MB
  • 04 - Passive Reconnaissance (PT0-002)/006 Using OSINT Tools (OBJ 2.1).mp4 178.5 MB
  • 14 - Attacks on Mobile Devices (PT0-002)/009 Conducting Malware Analysis (OBJ 3.5).mp4 167.5 MB
  • 25 - Conclusion (PT0-002)/001 Conclusion.mp4 142.9 MB
  • 12 - Application Attacks (PT0-002)/012 Attacking Web Applications (OBJ 3.3).mp4 136.2 MB
  • 05 - Active Reconnaissance (PT0-002)/003 Conducting Enumeration (OBJ 2.3).mp4 130.5 MB
  • 18 - Communication and Reports (PT0-002)/007 Written Reports (OBJ 4.1).mp4 124.6 MB
  • 03 - Scoping an Engagement (PT0-002)/003 Adversary Emulation (OBJ 1.2).mp4 121.7 MB
  • 14 - Attacks on Mobile Devices (PT0-002)/005 Mobile Device Insecurity (OBJ 3.5).mp4 121.4 MB
  • 10 - Network Attacks (PT0-002)/013 Intro to Metasploit (OBJ 3.1).mp4 121.0 MB
  • 08 - Social Engineering and Physical Attacks (PT0-002)/003 Social Engineering (OBJ 3.6).mp4 119.9 MB
  • 14 - Attacks on Mobile Devices (PT0-002)/006 Multifactor Authentication (OBJ 3.5).mp4 116.3 MB
  • 19 - Findings and Remediations (PT0-002)/002 Security Control Categories (OBJ 4.2).mp4 114.1 MB
  • 22 - Analyzing Scripts (PT0-002)/009 Perl Example (OBJ 5.2).mp4 113.4 MB
  • 15 - Attacks on Specialized Systems (PT0-002)/006 ICS Protocols and Vulnerabilities (OBJ 3.5).mp4 111.2 MB
  • 04 - Passive Reconnaissance (PT0-002)/008 Reconnaissance with CentralOps (OBJ 2.1).mp4 110.5 MB
  • 13 - Cloud Attacks (PT0-002)/008 Conducting Cloud Audits (OBJ 3.4).mp4 110.2 MB
  • 02 - Planning an Engagement (PT0-002)/009 Regulatory Compliance (OBJ 1.1).mp4 109.6 MB
  • 08 - Social Engineering and Physical Attacks (PT0-002)/005 Social Engineering Toolkit (OBJ 3.6).mp4 109.1 MB
  • 05 - Active Reconnaissance (PT0-002)/008 Eavesdropping (OBJ 2.2).mp4 108.1 MB
  • 11 - Application Vulnerabilities (PT0-002)/009 Vulnerable Components (OBJ 3.3).mp4 106.7 MB
  • 03 - Scoping an Engagement (PT0-002)/010 Build a Virtual Lab.mp4 106.6 MB
  • 12 - Application Attacks (PT0-002)/008 Burp Suite and SQLmap (OBJ 3.3).mp4 102.9 MB
  • 16 - Post-exploitation (PT0-002)/009 Escalating Privileges (OBJ 3.7).mp4 102.8 MB
  • 08 - Social Engineering and Physical Attacks (PT0-002)/002 Methods of Influence (OBJ 3.6).mp4 102.8 MB
  • 04 - Passive Reconnaissance (PT0-002)/011 URL Analysis (OBJ 2.1).mp4 100.9 MB
  • 19 - Findings and Remediations (PT0-002)/012 Mitigation Strategies (OBJ 4.2).mp4 100.7 MB
  • 22 - Analyzing Scripts (PT0-002)/010 Coding in JavaScript (OBJ 5.2).mp4 100.0 MB
  • 02 - Planning an Engagement (PT0-002)/002 Risk (OBJ 1.2).mp4 97.2 MB
  • 07 - Nmap (PT0-002)/005 Using Nmap (OBJ 2.3 and 2.4).mp4 90.6 MB
  • 14 - Attacks on Mobile Devices (PT0-002)/008 Malware Analysis (OBJ 3.5).mp4 90.2 MB
  • 15 - Attacks on Specialized Systems (PT0-002)/002 Internet of Things (IoT) Devices (OBJ 3.5).mp4 89.4 MB
  • 19 - Findings and Remediations (PT0-002)/004 Physical Controls (OBJ 4.2).mp4 87.3 MB
  • 03 - Scoping an Engagement (PT0-002)/006 Rules of Engagement (OBJ 1.2).mp4 86.7 MB
  • 10 - Network Attacks (PT0-002)/011 Password Attacks (OBJ 3.1).mp4 85.7 MB
  • 03 - Scoping an Engagement (PT0-002)/005 Identifying Restrictions (OBJ 1.1).mp4 85.2 MB
  • 05 - Active Reconnaissance (PT0-002)/009 Wardriving (OBJ 2.2).mp4 85.2 MB
  • 09 - Wireless Attacks (PT0-002)/007 WPS PIN Attacks (OBJ 3.2).mp4 84.6 MB
  • 22 - Analyzing Scripts (PT0-002)/002 Coding in Bash (OBJ 5.2).mp4 83.3 MB
  • 03 - Scoping an Engagement (PT0-002)/004 Target List (OBJ 1.2).mp4 83.2 MB
  • 11 - Application Vulnerabilities (PT0-002)/010 Software Composition (OBJ 3.3).mp4 82.8 MB
  • 06 - Vulnerability Scanning (PT0-002)/006 OpenVas Scanning (OBJ 2.3 and 2.4).mp4 80.8 MB
  • 06 - Vulnerability Scanning (PT0-002)/004 Scanning Considerations (OBJ 2.3 and 2.4).mp4 78.9 MB
  • 22 - Analyzing Scripts (PT0-002)/004 Coding in PowerShell (OBJ 5.2).mp4 78.3 MB
  • 06 - Vulnerability Scanning (PT0-002)/005 Nessus Scanning (OBJ 2.3 and 2.4).mp4 77.5 MB
  • 22 - Analyzing Scripts (PT0-002)/006 Coding in Python (OBJ 5.2).mp4 75.2 MB
  • 19 - Findings and Remediations (PT0-002)/006 Administrative Controls (OBJ 4.2).mp4 75.2 MB
  • 02 - Planning an Engagement (PT0-002)/003 Risk Handling (OBJ 1.2).mp4 74.5 MB
  • 17 - Detection Avoidance (PT0-002)/009 Persistence and Covering Your Tracks (OBJ 3.7).mp4 73.3 MB
  • 14 - Attacks on Mobile Devices (PT0-002)/004 Mobile Reconnaissance Concerns (OBJ 3.5).mp4 72.7 MB
  • 16 - Post-exploitation (PT0-002)/007 Lateral Movement (OBJ 3.7).mp4 72.7 MB
  • 19 - Findings and Remediations (PT0-002)/005 Operational Controls (OBJ 4.2).mp4 72.0 MB
  • 04 - Passive Reconnaissance (PT0-002)/004 Social Media Scraping (OBJ 2.1).mp4 72.0 MB
  • 02 - Planning an Engagement (PT0-002)/010 Professionalism (OBJ 1.3).mp4 70.7 MB
  • 06 - Vulnerability Scanning (PT0-002)/003 Vulnerability Scans (OBJ 2.3 and 2.4).mp4 70.4 MB
  • 12 - Application Attacks (PT0-002)/002 Directory Traversals (OBJ 3.3).mp4 70.3 MB
  • 17 - Detection Avoidance (PT0-002)/004 Living Off the Land (OBJ 3.7).mp4 69.9 MB
  • 02 - Planning an Engagement (PT0-002)/007 Planning a Test (OBJ 1.2).mp4 69.9 MB
  • 18 - Communication and Reports (PT0-002)/005 Presentation of Findings (4.1 & OBJ 4.3).mp4 68.4 MB
  • 06 - Vulnerability Scanning (PT0-002)/007 Nikto Scanning (OBJ 2.3 and 2.4).mp4 67.7 MB
  • 22 - Analyzing Scripts (PT0-002)/008 Coding in Perl (OBJ 5.2).mp4 67.3 MB
  • 05 - Active Reconnaissance (PT0-002)/010 DNS and ARP Analysis (OBJ 2.3).mp4 66.2 MB
  • 04 - Passive Reconnaissance (PT0-002)/012 Cryptographic Flaws (OBJ 2.1).mp4 65.9 MB
  • 14 - Attacks on Mobile Devices (PT0-002)/002 Enterprise Mobility Management (OBJ 3.5).mp4 65.1 MB
  • 03 - Scoping an Engagement (PT0-002)/002 Defining the Scope (OBJ 1.2).mp4 65.0 MB
  • 04 - Passive Reconnaissance (PT0-002)/005 OSINT Tools (OBJ 2.1).mp4 64.4 MB
  • 18 - Communication and Reports (PT0-002)/004 Reasons for Communication (OBJ 4.3).mp4 63.6 MB
  • 15 - Attacks on Specialized Systems (PT0-002)/005 ICS and SCADA Devices (OBJ 3.5).mp4 62.8 MB
  • 13 - Cloud Attacks (PT0-002)/004 Misconfigured Assets (OBJ 3.4).mp4 62.6 MB
  • 05 - Active Reconnaissance (PT0-002)/007 Packet Crafting (OBJ 2.2).mp4 62.5 MB
  • 24 - Tool Round-up (PT0-002)/013 Miscellaneous Tools (OBJ 5.3).mp4 62.0 MB
  • 02 - Planning an Engagement (PT0-002)/008 Legal Concepts (OBJ 1.1).mp4 61.5 MB
  • 04 - Passive Reconnaissance (PT0-002)/007 DNS Information (OBJ 2.1).mp4 60.9 MB
  • 03 - Scoping an Engagement (PT0-002)/009 Limitations and Permission (OBJ 1.1 and 1.3).mp4 59.9 MB
  • 02 - Planning an Engagement (PT0-002)/004 Controls (OBJ 1.2).mp4 59.8 MB
  • 17 - Detection Avoidance (PT0-002)/003 Creating Persistence (OBJ 3.7).mp4 58.7 MB
  • 19 - Findings and Remediations (PT0-002)/010 Digital Certificates (OBJ 4.2).mp4 58.2 MB
  • 09 - Wireless Attacks (PT0-002)/004 Signal Exploitation (OBJ 3.2).mp4 57.3 MB
  • 09 - Wireless Attacks (PT0-002)/002 Wireless Security (OBJ 3.2).mp4 57.1 MB
  • 11 - Application Vulnerabilities (PT0-002)/003 Buffer Overflows (OBJ 3.3).mp4 56.5 MB
  • 08 - Social Engineering and Physical Attacks (PT0-002)/007 Baiting Victims (OBJ 3.6).mp4 54.4 MB
  • 24 - Tool Round-up (PT0-002)/011 Steganography Tools (OBJ 5.3).mp4 53.3 MB
  • 05 - Active Reconnaissance (PT0-002)/006 Detecting and Evading Defenses (OBJ 2.2).mp4 52.5 MB
  • 24 - Tool Round-up (PT0-002)/005 Wireless Tools (OBJ 5.3).mp4 52.1 MB
  • 22 - Analyzing Scripts (PT0-002)/012 Coding in Ruby (OBJ 5.2).mp4 52.0 MB
  • 05 - Active Reconnaissance (PT0-002)/005 Website Reconnaissance (OBJ 2.3).mp4 52.0 MB
  • 21 - Scripting Basics (PT0-002)/002 Scripting Tools (OBJ 5.2).mp4 51.8 MB
  • 03 - Scoping an Engagement (PT0-002)/007 Assessment Types (OBJ 1.3).mp4 51.5 MB
  • 06 - Vulnerability Scanning (PT0-002)/002 Vulnerability Lifecycle (OBJ 2.3 and 2.4).mp4 50.9 MB
  • 08 - Social Engineering and Physical Attacks (PT0-002)/006 Pretexting (OBJ 3.6).mp4 50.1 MB
  • 04 - Passive Reconnaissance (PT0-002)/003 Open-Source Intelligence (OSINT) (OBJ 2.1).mp4 49.3 MB
  • 24 - Tool Round-up (PT0-002)/008 Credential Testing Tools (OBJ 5.3).mp4 48.9 MB
  • 11 - Application Vulnerabilities (PT0-002)/005 Authentication and References (OBJ 3.3).mp4 47.3 MB
  • 10 - Network Attacks (PT0-002)/009 NAC Bypass (OBJ 3.1).mp4 47.0 MB
  • 15 - Attacks on Specialized Systems (PT0-002)/003 Internet of Things (IoT) Vulnerabilities (OBJ 3.5).mp4 46.3 MB
  • 07 - Nmap (PT0-002)/002 Nmap Discovery Scans (OBJ 2.3 and 2.4).mp4 46.2 MB
  • 22 - Analyzing Scripts (PT0-002)/011 JavaScript Example (OBJ 5.2).mp4 46.2 MB
  • 24 - Tool Round-up (PT0-002)/012 Debuggers (OBJ 5.3).mp4 46.2 MB
  • 05 - Active Reconnaissance (PT0-002)/002 Scanning and Enumeration (OBJ 2.2 and 2.3).mp4 45.8 MB
  • 09 - Wireless Attacks (PT0-002)/010 Bluetooth Attacks (OBJ 3.2).mp4 45.6 MB
  • 10 - Network Attacks (PT0-002)/003 Exploit Resources (OBJ 3.1).mp4 45.3 MB
  • 15 - Attacks on Specialized Systems (PT0-002)/007 Data Storage Vulnerabilities (OBJ 3.5).mp4 44.9 MB
  • 03 - Scoping an Engagement (PT0-002)/008 Validating the Scope (OBJ 1.2).mp4 44.1 MB
  • 09 - Wireless Attacks (PT0-002)/005 WEP Hacking (OBJ 3.2).mp4 44.1 MB
  • 13 - Cloud Attacks (PT0-002)/003 Credential Harvesting (OBJ 3.4).mp4 43.3 MB
  • 21 - Scripting Basics (PT0-002)/003 Variables (OBJ 5.1).mp4 43.3 MB
  • 15 - Attacks on Specialized Systems (PT0-002)/008 Virtual Environments (OBJ 3.5).mp4 43.3 MB
  • 19 - Findings and Remediations (PT0-002)/009 Implementing MFA (OBJ 4.2).mp4 43.2 MB
  • 04 - Passive Reconnaissance (PT0-002)/002 Information Gathering (OBJ 2.1).mp4 42.6 MB
  • 08 - Social Engineering and Physical Attacks (PT0-002)/008 Impersonation (OBJ 3.6).mp4 41.8 MB
  • 16 - Post-exploitation (PT0-002)/005 Pass the Hash (OBJ 3.7).mp4 41.3 MB
  • 15 - Attacks on Specialized Systems (PT0-002)/010 Containerization (OBJ 3.5).mp4 40.7 MB
  • 17 - Detection Avoidance (PT0-002)/005 Data Exfiltration (OBJ 3.7).mp4 40.3 MB
  • 02 - Planning an Engagement (PT0-002)/006 PenTest Standards (OBJ 1.2).mp4 40.3 MB
  • 24 - Tool Round-up (PT0-002)/003 Scanning Tools (OBJ 5.3).mp4 40.1 MB
  • 19 - Findings and Remediations (PT0-002)/003 Selecting Security Controls (OBJ 4.2).mp4 40.0 MB
  • 15 - Attacks on Specialized Systems (PT0-002)/009 Virtual Machine Attacks (OBJ 3.5).mp4 39.3 MB
  • 12 - Application Attacks (PT0-002)/005 Cross-Site Request Forgery (CSRF) (OBJ 3.3).mp4 39.2 MB
  • 04 - Passive Reconnaissance (PT0-002)/013 CWE & CVE (OBJ 2.1).mp4 39.1 MB
  • 09 - Wireless Attacks (PT0-002)/011 RFID and NFC Attacks (OBJ 3.2).mp4 38.0 MB
  • 24 - Tool Round-up (PT0-002)/002 OSINT Tools (OBJ 5.3).mp4 37.7 MB
  • 12 - Application Attacks (PT0-002)/007 Conducting SQL Injections (OBJ 3.3).mp4 37.7 MB
  • 18 - Communication and Reports (PT0-002)/002 Communication Paths (OBJ 4.3).mp4 37.0 MB
  • 23 - Exploits and Automation (PT0-002)/003 Exploits for Remote Access (OBJ 5.2).mp4 36.8 MB
  • 08 - Social Engineering and Physical Attacks (PT0-002)/012 Social Engineering Tools (OBJ 3.6).mp4 36.4 MB
  • 16 - Post-exploitation (PT0-002)/008 Pivoting (3.7).mp4 36.1 MB
  • 04 - Passive Reconnaissance (PT0-002)/009 Public Repositories (OBJ2.1).mp4 34.3 MB
  • 10 - Network Attacks (PT0-002)/012 Pass the Hash (OBJ 3.1).mp4 34.3 MB
  • 10 - Network Attacks (PT0-002)/002 Stress Testing (OBJ 3.1).mp4 33.9 MB
  • 11 - Application Vulnerabilities (PT0-002)/001 Application Vulnerabilities (OBJ 3.3).mp4 33.5 MB
  • 19 - Findings and Remediations (PT0-002)/007 System Hardening (OBJ 4.2).mp4 32.8 MB
  • 22 - Analyzing Scripts (PT0-002)/001 Analyzing Scripts (OBJ 5.2).mp4 32.8 MB
  • 21 - Scripting Basics (PT0-002)/006 Data Structures (OBJ 5.1).mp4 32.7 MB
  • 09 - Wireless Attacks (PT0-002)/006 WPAWPA2 Hacking (OBJ 3.2).mp4 32.5 MB
  • 10 - Network Attacks (PT0-002)/008 VLAN Hopping (OBJ 3.1).mp4 32.4 MB
  • 18 - Communication and Reports (PT0-002)/003 Communication Triggers (OBJ 4.3).mp4 32.4 MB
  • 10 - Network Attacks (PT0-002)/007 MAC Spoofing (OBJ 3.1).mp4 32.2 MB
  • 09 - Wireless Attacks (PT0-002)/008 Evil Twins (OBJ 3.2).mp4 32.1 MB
  • 04 - Passive Reconnaissance (PT0-002)/001 Passive Reconnaissance (OBJ 2.1).mp4 31.9 MB
  • 17 - Detection Avoidance (PT0-002)/008 Covering Your Tracks (OBJ 3.7).mp4 31.8 MB
  • 08 - Social Engineering and Physical Attacks (PT0-002)/011 Physical Attacks (OBJ 3.6).mp4 30.9 MB
  • 14 - Attacks on Mobile Devices (PT0-002)/003 Deployment Options (OBJ 3.5).mp4 30.5 MB
  • 10 - Network Attacks (PT0-002)/001 Network Attacks (OBJ 3.1).mp4 30.4 MB
  • 20 - Post-report Activities (PT0-002)/007 Lessons Learned (OBJ 4.2).mp4 30.3 MB
  • 10 - Network Attacks (PT0-002)/004 ARP Poisoning (OBJ 3.1).mp4 30.0 MB
  • 10 - Network Attacks (PT0-002)/005 DNS Cache Poisoning (OBJ 3.1).mp4 29.7 MB
  • 14 - Attacks on Mobile Devices (PT0-002)/001 Attacks on Mobile Devices (OBJ 3.5).mp4 29.6 MB
  • 11 - Application Vulnerabilities (PT0-002)/002 Race Conditions (OBJ 3.3).mp4 29.3 MB
  • 07 - Nmap (PT0-002)/003 Nmap Port Scans (OBJ 2.3 and 2.4).mp4 28.9 MB
  • 11 - Application Vulnerabilities (PT0-002)/004 Buffer Overflow Attacks (OBJ 3.3).mp4 28.7 MB
  • 02 - Planning an Engagement (PT0-002)/005 PenTest Methodologies (OBJ 1.2).mp4 28.5 MB
  • 16 - Post-exploitation (PT0-002)/010 Upgrading Restrictive Shells (OBJ 3.7).mp4 28.4 MB
  • 05 - Active Reconnaissance (PT0-002)/004 Other Enumeration (OBJ 2.2 and 2.3).mp4 28.3 MB
  • 17 - Detection Avoidance (PT0-002)/002 Trojans and Backdoors (OBJ 3.7).mp4 27.9 MB
  • 22 - Analyzing Scripts (PT0-002)/005 PowerShell Example (OBJ 5.2).mp4 27.9 MB
  • 12 - Application Attacks (PT0-002)/003 Dirbuster (OBJ 3.3).mp4 27.2 MB
  • 12 - Application Attacks (PT0-002)/004 Cross-Site Scripting (XSS) (OBJ 3.3).mp4 27.1 MB
  • 13 - Cloud Attacks (PT0-002)/007 Auditing the Cloud (OBJ 3.4).mp4 26.8 MB
  • 20 - Post-report Activities (PT0-002)/006 Attestation of Findings (OBJ 4.2).mp4 26.5 MB
  • 21 - Scripting Basics (PT0-002)/007 Object Oriented Programming (OBJ 5.1).mp4 26.3 MB
  • 16 - Post-exploitation (PT0-002)/002 Enumerating the Network (OBJ 3.7).mp4 26.0 MB
  • 07 - Nmap (PT0-002)/004 Nmap Fingerprinting (OBJ 2.3 and 2.4).mp4 25.6 MB
  • 13 - Cloud Attacks (PT0-002)/002 Attacking the Cloud (OBJ 3.4).mp4 25.6 MB
  • 24 - Tool Round-up (PT0-002)/007 Remote Access Tools (OBJ 5.3).mp4 25.4 MB
  • 08 - Social Engineering and Physical Attacks (PT0-002)/004 Phishing Campaigns (OBJ 3.6).mp4 25.2 MB
  • 16 - Post-exploitation (PT0-002)/003 Network Segmentation Testing (OBJ 3.7).mp4 25.2 MB
  • 13 - Cloud Attacks (PT0-002)/005 Metadata Service Attack (OBJ 3.4).mp4 24.8 MB
  • 12 - Application Attacks (PT0-002)/010 XML Injections (OBJ 3.3).mp4 24.8 MB
  • 19 - Findings and Remediations (PT0-002)/008 Secure Coding (OBJ 4.2).mp4 24.7 MB
  • 20 - Post-report Activities (PT0-002)/005 Client Acceptance (OBJ 4.2).mp4 24.5 MB
  • 10 - Network Attacks (PT0-002)/006 LLMNRNBT-NS Poisoning (OBJ 3.1).mp4 24.1 MB
  • 10 - Network Attacks (PT0-002)/015 Using Netcat (OBJ 3.1).mp4 23.2 MB
  • 15 - Attacks on Specialized Systems (PT0-002)/004 Embedded Systems (OBJ 3.5).mp4 23.1 MB
  • 11 - Application Vulnerabilities (PT0-002)/007 Improper Headers (OBJ 3.3).mp4 22.7 MB
  • 14 - Attacks on Mobile Devices (PT0-002)/007 Mobile Device Attacks (OBJ 3.5).mp4 22.5 MB
  • 18 - Communication and Reports (PT0-002)/009 Securing and Storing Reports (OBJ 4.1).mp4 22.3 MB
  • 12 - Application Attacks (PT0-002)/009 OWASP ZAP (OBJ 3.3).mp4 22.2 MB
  • 23 - Exploits and Automation (PT0-002)/006 Automation in Engagements (OBJ 5.2).mp4 22.2 MB
  • 08 - Social Engineering and Physical Attacks (PT0-002)/001 Social Engineering and Physical Attacks (OBJ 3.6).mp4 21.7 MB
  • 09 - Wireless Attacks (PT0-002)/003 Bypassing MAC Filtering (OBJ 3.2).mp4 21.0 MB
  • 14 - Attacks on Mobile Devices (PT0-002)/010 Mobile Device Tools (OBJ 3.5).mp4 20.2 MB
  • 22 - Analyzing Scripts (PT0-002)/013 Ruby Example (OBJ 5.2).mp4 20.0 MB
  • 12 - Application Attacks (PT0-002)/006 SQL Injections (OBJ 3.3).mp4 20.0 MB
  • 10 - Network Attacks (PT0-002)/014 Netcat (OBJ 3.1).mp4 19.5 MB
  • 22 - Analyzing Scripts (PT0-002)/003 Bash Example (OBJ 5.2).mp4 19.5 MB
  • 16 - Post-exploitation (PT0-002)/006 Golden Ticket (OBJ 3.7).mp4 18.2 MB
  • 23 - Exploits and Automation (PT0-002)/005 Exploits for Enumerating Assets (OBJ 5.2).mp4 17.9 MB
  • 23 - Exploits and Automation (PT0-002)/004 Exploits for Enumerating Users (OBJ 5.2).mp4 17.8 MB
  • 24 - Tool Round-up (PT0-002)/009 Web Application Tools (OBJ 5.3).mp4 17.0 MB
  • 18 - Communication and Reports (PT0-002)/006 Report Data Gathering (OBJ 4.1).mp4 16.8 MB
  • 04 - Passive Reconnaissance (PT0-002)/010 Search Engine Analysis (OBJ 2.1).mp4 16.7 MB
  • 24 - Tool Round-up (PT0-002)/004 Networking Tools (OBJ 5.3).mp4 16.6 MB
  • 22 - Analyzing Scripts (PT0-002)/007 Python Example (OBJ 5.2).mp4 16.6 MB
  • 09 - Wireless Attacks (PT0-002)/001 Wireless Attacks (OBJ 3.2).mp4 16.0 MB
  • 17 - Detection Avoidance (PT0-002)/007 Steganography (3.7).mp4 16.0 MB
  • 11 - Application Vulnerabilities (PT0-002)/011 Privilege Escalation (OBJ 3.3).mp4 15.8 MB
  • 11 - Application Vulnerabilities (PT0-002)/008 Code Signing (OBJ 3.3).mp4 15.7 MB
  • 23 - Exploits and Automation (PT0-002)/002 Exploits to Download Files (OBJ 5.2).mp4 15.3 MB
  • 24 - Tool Round-up (PT0-002)/006 Social Engineering Tools (OBJ 5.3).mp4 15.2 MB
  • 20 - Post-report Activities (PT0-002)/002 Removing Shells and Tools (OBJ 4.2).mp4 15.0 MB
  • 17 - Detection Avoidance (PT0-002)/006 Covert Channels (OBJ 3.7).mp4 14.3 MB
  • 11 - Application Vulnerabilities (PT0-002)/006 Improper Error Handling (OBJ 3.3).mp4 14.0 MB
  • 21 - Scripting Basics (PT0-002)/005 Logic Control (OBJ 5.1).mp4 13.9 MB
  • 16 - Post-exploitation (PT0-002)/004 Lateral Movement and Pivoting (OBJ 3.7).mp4 13.5 MB
  • 23 - Exploits and Automation (PT0-002)/007 Automation with Nmap Scripts (OBJ 5.2).mp4 13.5 MB
  • 24 - Tool Round-up (PT0-002)/001 Tool Round-up (OBJ 5.3).mp4 13.3 MB
  • 25 - Conclusion (PT0-002)/002 BONUS Where to go from here.mp4 13.1 MB
  • 15 - Attacks on Specialized Systems (PT0-002)/001 Attacks on Specialized Systems (OBJ 3.5).mp4 13.1 MB
  • 10 - Network Attacks (PT0-002)/010 On-path Attack (OBJ 3.1).mp4 12.8 MB
  • 20 - Post-report Activities (PT0-002)/001 Post-report Activities (OBJ 4.2).mp4 12.6 MB
  • 12 - Application Attacks (PT0-002)/001 Application Attacks (OBJ 3.3).mp4 12.4 MB
  • 24 - Tool Round-up (PT0-002)/010 Cloud Tools (OBJ 5.3).mp4 12.2 MB
  • 01 - Welcome to the Course (PT0-002)/003 Exam Tips.mp4 11.8 MB
  • 19 - Findings and Remediations (PT0-002)/001 Findings and Remediations (OBJ 4.2).mp4 11.7 MB
  • 21 - Scripting Basics (PT0-002)/004 Loops (OBJ 5.1).mp4 11.2 MB
  • 09 - Wireless Attacks (PT0-002)/009 On-path and Relay Attacks (OBJ 3.2).mp4 11.1 MB
  • 03 - Scoping an Engagement (PT0-002)/001 Scoping an Engagement (OBJ 1.1, 1.2, and 1.3).mp4 11.0 MB
  • 02 - Planning an Engagement (PT0-002)/001 Planning an Engagement (OBJ 1.1, 1.2, and 1.3).mp4 10.9 MB
  • 05 - Active Reconnaissance (PT0-002)/001 Active Reconnaissance (OBJ 2.2 and 2.3).mp4 10.7 MB
  • 20 - Post-report Activities (PT0-002)/008 Retesting (OBJ 4.2).mp4 10.3 MB
  • 12 - Application Attacks (PT0-002)/011 Other Injection Attacks (OBJ 3.3).mp4 10.2 MB
  • 08 - Social Engineering and Physical Attacks (PT0-002)/010 Lock Picking (OBJ 3.6).mp4 10.2 MB
  • 19 - Findings and Remediations (PT0-002)/011 Other Technical Controls (OBJ 4.2).mp4 10.1 MB
  • 20 - Post-report Activities (PT0-002)/003 Deleting Test Credentials (OBJ 4.2).mp4 10.1 MB
  • 23 - Exploits and Automation (PT0-002)/001 Exploits and Automation (OBJ 5.2).mp4 9.8 MB
  • 20 - Post-report Activities (PT0-002)/004 Destroy Test Data (OBJ 4.2).mp4 9.8 MB
  • 18 - Communication and Reports (PT0-002)/008 Common Themes (OBJ 4.1).mp4 9.1 MB
  • 06 - Vulnerability Scanning (PT0-002)/001 Vulnerability Scanning (OBJ 2.3 and 2.4).mp4 9.1 MB
  • 16 - Post-exploitation (PT0-002)/001 Post-exploitation (OBJ 3.7).mp4 8.9 MB
  • 13 - Cloud Attacks (PT0-002)/006 Software Development Kit (SDK) (OBJ 3.4).mp4 8.7 MB
  • 17 - Detection Avoidance (PT0-002)/010 Post-Exploitation Tools (OBJ 3.7).mp4 8.4 MB
  • 07 - Nmap (PT0-002)/001 Nmap (OBJ 2.3 and 2.4).mp4 8.0 MB
  • 21 - Scripting Basics (PT0-002)/001 Scripting Basics (OBJ 5.1 & OBJ 5.2).mp4 7.5 MB
  • 13 - Cloud Attacks (PT0-002)/001 Cloud Attacks (OBJ 3.4).mp4 6.9 MB
  • 01 - Welcome to the Course (PT0-002)/002 CompTIA-PenTest-PT0-002-Study-Notes.pdf 6.8 MB
  • 18 - Communication and Reports (PT0-002)/001 Communication and Reports (OBJ 4.3).mp4 5.6 MB
  • 17 - Detection Avoidance (PT0-002)/001 Detection Avoidance (OBJ 3.7).mp4 5.0 MB
  • 01 - Welcome to the Course (PT0-002)/002 PenTest-PT0-002-Objectives.pdf 155.1 kB
  • 04 - Passive Reconnaissance (PT0-002)/006 Using OSINT Tools (OBJ 2.1)_en.srt 58.7 kB
  • 05 - Active Reconnaissance (PT0-002)/010 DNS and ARP Analysis (OBJ 2.3)_en.srt 52.2 kB
  • 14 - Attacks on Mobile Devices (PT0-002)/009 Conducting Malware Analysis (OBJ 3.5)_en.srt 48.0 kB
  • 22 - Analyzing Scripts (PT0-002)/006 Coding in Python (OBJ 5.2)_en.srt 40.2 kB
  • 07 - Nmap (PT0-002)/006 Nmap Scripting Engine (OBJ 2.3 and 2.4)_en.srt 39.3 kB
  • 16 - Post-exploitation (PT0-002)/009 Escalating Privileges (OBJ 3.7)_en.srt 39.0 kB
  • 22 - Analyzing Scripts (PT0-002)/002 Coding in Bash (OBJ 5.2)_en.srt 37.0 kB
  • 08 - Social Engineering and Physical Attacks (PT0-002)/009 Physical Security (OBJ 3.6)_en.srt 36.6 kB
  • 03 - Scoping an Engagement (PT0-002)/010 Build a Virtual Lab_en.srt 36.6 kB
  • 05 - Active Reconnaissance (PT0-002)/011 Network Traffic Analysis (OBJ 2.3)_en.srt 36.1 kB
  • 10 - Network Attacks (PT0-002)/013 Intro to Metasploit (OBJ 3.1)_en.srt 36.0 kB
  • 04 - Passive Reconnaissance (PT0-002)/012 Cryptographic Flaws (OBJ 2.1)_en.srt 35.2 kB
  • 09 - Wireless Attacks (PT0-002)/002 Wireless Security (OBJ 3.2)_en.srt 33.6 kB
  • 12 - Application Attacks (PT0-002)/012 Attacking Web Applications (OBJ 3.3)_en.srt 33.4 kB
  • 22 - Analyzing Scripts (PT0-002)/010 Coding in JavaScript (OBJ 5.2)_en.srt 33.1 kB
  • 14 - Attacks on Mobile Devices (PT0-002)/008 Malware Analysis (OBJ 3.5)_en.srt 32.7 kB
  • 04 - Passive Reconnaissance (PT0-002)/011 URL Analysis (OBJ 2.1)_en.srt 32.7 kB
  • 19 - Findings and Remediations (PT0-002)/006 Administrative Controls (OBJ 4.2)_en.srt 32.0 kB
  • 22 - Analyzing Scripts (PT0-002)/008 Coding in Perl (OBJ 5.2)_en.srt 32.0 kB
  • 18 - Communication and Reports (PT0-002)/007 Written Reports (OBJ 4.1)_en.srt 31.8 kB
  • 08 - Social Engineering and Physical Attacks (PT0-002)/003 Social Engineering (OBJ 3.6)_en.srt 31.6 kB
  • 02 - Planning an Engagement (PT0-002)/009 Regulatory Compliance (OBJ 1.1)_en.srt 31.5 kB
  • 05 - Active Reconnaissance (PT0-002)/003 Conducting Enumeration (OBJ 2.3)_en.srt 30.7 kB
  • 22 - Analyzing Scripts (PT0-002)/009 Perl Example (OBJ 5.2)_en.srt 30.2 kB
  • 06 - Vulnerability Scanning (PT0-002)/006 OpenVas Scanning (OBJ 2.3 and 2.4)_en.srt 29.4 kB
  • 08 - Social Engineering and Physical Attacks (PT0-002)/005 Social Engineering Toolkit (OBJ 3.6)_en.srt 29.2 kB
  • 19 - Findings and Remediations (PT0-002)/002 Security Control Categories (OBJ 4.2)_en.srt 28.9 kB
  • 22 - Analyzing Scripts (PT0-002)/004 Coding in PowerShell (OBJ 5.2)_en.srt 28.8 kB
  • 13 - Cloud Attacks (PT0-002)/008 Conducting Cloud Audits (OBJ 3.4)_en.srt 28.7 kB
  • 22 - Analyzing Scripts (PT0-002)/012 Coding in Ruby (OBJ 5.2)_en.srt 27.9 kB
  • 14 - Attacks on Mobile Devices (PT0-002)/005 Mobile Device Insecurity (OBJ 3.5)_en.srt 27.6 kB
  • 14 - Attacks on Mobile Devices (PT0-002)/006 Multifactor Authentication (OBJ 3.5)_en.srt 27.5 kB
  • 01 - Welcome to the Course (PT0-002)/001 Welcome_en.srt 27.4 kB
  • 08 - Social Engineering and Physical Attacks (PT0-002)/002 Methods of Influence (OBJ 3.6)_en.srt 26.9 kB
  • 04 - Passive Reconnaissance (PT0-002)/008 Reconnaissance with CentralOps (OBJ 2.1)_en.srt 26.8 kB
  • 09 - Wireless Attacks (PT0-002)/004 Signal Exploitation (OBJ 3.2)_en.srt 26.8 kB
  • 19 - Findings and Remediations (PT0-002)/007 System Hardening (OBJ 4.2)_en.srt 26.6 kB
  • 11 - Application Vulnerabilities (PT0-002)/003 Buffer Overflows (OBJ 3.3)_en.srt 26.5 kB
  • 17 - Detection Avoidance (PT0-002)/004 Living Off the Land (OBJ 3.7)_en.srt 26.5 kB
  • 17 - Detection Avoidance (PT0-002)/003 Creating Persistence (OBJ 3.7)_en.srt 26.3 kB
  • 11 - Application Vulnerabilities (PT0-002)/012 Conducting Privilege Escalation (OBJ 3.3)_en.srt 26.3 kB
  • 25 - Conclusion (PT0-002)/001 Conclusion_en.srt 25.9 kB
  • 03 - Scoping an Engagement (PT0-002)/003 Adversary Emulation (OBJ 1.2)_en.srt 25.6 kB
  • 19 - Findings and Remediations (PT0-002)/005 Operational Controls (OBJ 4.2)_en.srt 25.5 kB
  • 13 - Cloud Attacks (PT0-002)/004 Misconfigured Assets (OBJ 3.4)_en.srt 25.3 kB
  • 10 - Network Attacks (PT0-002)/005 DNS Cache Poisoning (OBJ 3.1)_en.srt 25.3 kB
  • 15 - Attacks on Specialized Systems (PT0-002)/006 ICS Protocols and Vulnerabilities (OBJ 3.5)_en.srt 25.2 kB
  • 04 - Passive Reconnaissance (PT0-002)/005 OSINT Tools (OBJ 2.1)_en.srt 24.8 kB
  • 06 - Vulnerability Scanning (PT0-002)/003 Vulnerability Scans (OBJ 2.3 and 2.4)_en.srt 24.6 kB
  • 04 - Passive Reconnaissance (PT0-002)/004 Social Media Scraping (OBJ 2.1)_en.srt 24.5 kB
  • 08 - Social Engineering and Physical Attacks (PT0-002)/011 Physical Attacks (OBJ 3.6)_en.srt 24.4 kB
  • 11 - Application Vulnerabilities (PT0-002)/009 Vulnerable Components (OBJ 3.3)_en.srt 24.3 kB
  • 03 - Scoping an Engagement (PT0-002)/004 Target List (OBJ 1.2)_en.srt 24.3 kB
  • 18 - Communication and Reports (PT0-002)/004 Reasons for Communication (OBJ 4.3)_en.srt 23.8 kB
  • 09 - Wireless Attacks (PT0-002)/007 WPS PIN Attacks (OBJ 3.2)_en.srt 23.2 kB
  • 02 - Planning an Engagement (PT0-002)/010 Professionalism (OBJ 1.3)_en.srt 23.1 kB
  • 21 - Scripting Basics (PT0-002)/006 Data Structures (OBJ 5.1)_en.srt 23.0 kB
  • 04 - Passive Reconnaissance (PT0-002)/007 DNS Information (OBJ 2.1)_en.srt 22.9 kB
  • 05 - Active Reconnaissance (PT0-002)/008 Eavesdropping (OBJ 2.2)_en.srt 22.9 kB
  • 05 - Active Reconnaissance (PT0-002)/005 Website Reconnaissance (OBJ 2.3)_en.srt 22.9 kB
  • 19 - Findings and Remediations (PT0-002)/010 Digital Certificates (OBJ 4.2)_en.srt 22.2 kB
  • 05 - Active Reconnaissance (PT0-002)/007 Packet Crafting (OBJ 2.2)_en.srt 22.0 kB
  • 10 - Network Attacks (PT0-002)/015 Using Netcat (OBJ 3.1)_en.srt 21.9 kB
  • 15 - Attacks on Specialized Systems (PT0-002)/005 ICS and SCADA Devices (OBJ 3.5)_en.srt 21.6 kB
  • 07 - Nmap (PT0-002)/005 Using Nmap (OBJ 2.3 and 2.4)_en.srt 21.5 kB
  • 11 - Application Vulnerabilities (PT0-002)/010 Software Composition (OBJ 3.3)_en.srt 21.4 kB
  • 05 - Active Reconnaissance (PT0-002)/006 Detecting and Evading Defenses (OBJ 2.2)_en.srt 21.2 kB
  • 05 - Active Reconnaissance (PT0-002)/004 Other Enumeration (OBJ 2.2 and 2.3)_en.srt 21.2 kB
  • 05 - Active Reconnaissance (PT0-002)/002 Scanning and Enumeration (OBJ 2.2 and 2.3)_en.srt 21.2 kB
  • 21 - Scripting Basics (PT0-002)/002 Scripting Tools (OBJ 5.2)_en.srt 21.2 kB
  • 19 - Findings and Remediations (PT0-002)/008 Secure Coding (OBJ 4.2)_en.srt 20.9 kB
  • 02 - Planning an Engagement (PT0-002)/007 Planning a Test (OBJ 1.2)_en.srt 20.7 kB
  • 06 - Vulnerability Scanning (PT0-002)/004 Scanning Considerations (OBJ 2.3 and 2.4)_en.srt 20.7 kB
  • 10 - Network Attacks (PT0-002)/011 Password Attacks (OBJ 3.1)_en.srt 20.6 kB
  • 14 - Attacks on Mobile Devices (PT0-002)/002 Enterprise Mobility Management (OBJ 3.5)_en.srt 20.6 kB
  • 12 - Application Attacks (PT0-002)/008 Burp Suite and SQLmap (OBJ 3.3)_en.srt 20.5 kB
  • 07 - Nmap (PT0-002)/003 Nmap Port Scans (OBJ 2.3 and 2.4)_en.srt 20.4 kB
  • 03 - Scoping an Engagement (PT0-002)/007 Assessment Types (OBJ 1.3)_en.srt 20.3 kB
  • 02 - Planning an Engagement (PT0-002)/002 Risk (OBJ 1.2)_en.srt 20.2 kB
  • 17 - Detection Avoidance (PT0-002)/008 Covering Your Tracks (OBJ 3.7)_en.srt 20.1 kB
  • 12 - Application Attacks (PT0-002)/004 Cross-Site Scripting (XSS) (OBJ 3.3)_en.srt 19.8 kB
  • 22 - Analyzing Scripts (PT0-002)/011 JavaScript Example (OBJ 5.2)_en.srt 19.3 kB
  • 06 - Vulnerability Scanning (PT0-002)/005 Nessus Scanning (OBJ 2.3 and 2.4)_en.srt 19.0 kB
  • 12 - Application Attacks (PT0-002)/002 Directory Traversals (OBJ 3.3)_en.srt 18.8 kB
  • 06 - Vulnerability Scanning (PT0-002)/002 Vulnerability Lifecycle (OBJ 2.3 and 2.4)_en.srt 18.8 kB
  • 12 - Application Attacks (PT0-002)/007 Conducting SQL Injections (OBJ 3.3)_en.srt 18.5 kB
  • 03 - Scoping an Engagement (PT0-002)/005 Identifying Restrictions (OBJ 1.1)_en.srt 18.2 kB
  • 19 - Findings and Remediations (PT0-002)/012 Mitigation Strategies (OBJ 4.2)_en.srt 18.0 kB
  • 24 - Tool Round-up (PT0-002)/013 Miscellaneous Tools (OBJ 5.3)_en.srt 18.0 kB
  • 17 - Detection Avoidance (PT0-002)/009 Persistence and Covering Your Tracks (OBJ 3.7)_en.srt 18.0 kB
  • 09 - Wireless Attacks (PT0-002)/005 WEP Hacking (OBJ 3.2)_en.srt 18.0 kB
  • 16 - Post-exploitation (PT0-002)/007 Lateral Movement (OBJ 3.7)_en.srt 18.0 kB
  • 14 - Attacks on Mobile Devices (PT0-002)/004 Mobile Reconnaissance Concerns (OBJ 3.5)_en.srt 17.9 kB
  • 02 - Planning an Engagement (PT0-002)/008 Legal Concepts (OBJ 1.1)_en.srt 17.8 kB
  • 05 - Active Reconnaissance (PT0-002)/009 Wardriving (OBJ 2.2)_en.srt 17.5 kB
  • 03 - Scoping an Engagement (PT0-002)/006 Rules of Engagement (OBJ 1.2)_en.srt 17.4 kB
  • 23 - Exploits and Automation (PT0-002)/003 Exploits for Remote Access (OBJ 5.2)_en.srt 17.4 kB
  • 15 - Attacks on Specialized Systems (PT0-002)/008 Virtual Environments (OBJ 3.5)_en.srt 17.4 kB
  • 09 - Wireless Attacks (PT0-002)/006 WPAWPA2 Hacking (OBJ 3.2)_en.srt 17.1 kB
  • 16 - Post-exploitation (PT0-002)/005 Pass the Hash (OBJ 3.7)_en.srt 17.1 kB
  • 13 - Cloud Attacks (PT0-002)/003 Credential Harvesting (OBJ 3.4)_en.srt 17.0 kB
  • 08 - Social Engineering and Physical Attacks (PT0-002)/007 Baiting Victims (OBJ 3.6)_en.srt 16.9 kB
  • 02 - Planning an Engagement (PT0-002)/003 Risk Handling (OBJ 1.2)_en.srt 16.6 kB
  • 10 - Network Attacks (PT0-002)/012 Pass the Hash (OBJ 3.1)_en.srt 16.6 kB
  • 15 - Attacks on Specialized Systems (PT0-002)/002 Internet of Things (IoT) Devices (OBJ 3.5)_en.srt 16.5 kB
  • 15 - Attacks on Specialized Systems (PT0-002)/003 Internet of Things (IoT) Vulnerabilities (OBJ 3.5)_en.srt 16.5 kB
  • 24 - Tool Round-up (PT0-002)/011 Steganography Tools (OBJ 5.3)_en.srt 16.5 kB
  • 19 - Findings and Remediations (PT0-002)/004 Physical Controls (OBJ 4.2)_en.srt 16.4 kB
  • 07 - Nmap (PT0-002)/002 Nmap Discovery Scans (OBJ 2.3 and 2.4)_en.srt 16.4 kB
  • 12 - Application Attacks (PT0-002)/005 Cross-Site Request Forgery (CSRF) (OBJ 3.3)_en.srt 16.3 kB
  • 02 - Planning an Engagement (PT0-002)/005 PenTest Methodologies (OBJ 1.2)_en.srt 16.2 kB
  • 16 - Post-exploitation (PT0-002)/008 Pivoting (3.7)_en.srt 16.1 kB
  • 04 - Passive Reconnaissance (PT0-002)/003 Open-Source Intelligence (OSINT) (OBJ 2.1)_en.srt 15.8 kB
  • 15 - Attacks on Specialized Systems (PT0-002)/004 Embedded Systems (OBJ 3.5)_en.srt 15.8 kB
  • 14 - Attacks on Mobile Devices (PT0-002)/010 Mobile Device Tools (OBJ 3.5)_en.srt 15.8 kB
  • 10 - Network Attacks (PT0-002)/014 Netcat (OBJ 3.1)_en.srt 15.7 kB
  • 02 - Planning an Engagement (PT0-002)/004 Controls (OBJ 1.2)_en.srt 15.4 kB
  • 03 - Scoping an Engagement (PT0-002)/009 Limitations and Permission (OBJ 1.1 and 1.3)_en.srt 15.3 kB
  • 12 - Application Attacks (PT0-002)/006 SQL Injections (OBJ 3.3)_en.srt 15.3 kB
  • 12 - Application Attacks (PT0-002)/003 Dirbuster (OBJ 3.3)_en.srt 15.2 kB
  • 19 - Findings and Remediations (PT0-002)/009 Implementing MFA (OBJ 4.2)_en.srt 15.1 kB
  • 03 - Scoping an Engagement (PT0-002)/002 Defining the Scope (OBJ 1.2)_en.srt 15.0 kB
  • 21 - Scripting Basics (PT0-002)/003 Variables (OBJ 5.1)_en.srt 15.0 kB
  • 10 - Network Attacks (PT0-002)/004 ARP Poisoning (OBJ 3.1)_en.srt 14.9 kB
  • 24 - Tool Round-up (PT0-002)/008 Credential Testing Tools (OBJ 5.3)_en.srt 14.9 kB
  • 24 - Tool Round-up (PT0-002)/005 Wireless Tools (OBJ 5.3)_en.srt 14.7 kB
  • 17 - Detection Avoidance (PT0-002)/007 Steganography (3.7)_en.srt 14.4 kB
  • 17 - Detection Avoidance (PT0-002)/005 Data Exfiltration (OBJ 3.7)_en.srt 14.4 kB
  • 10 - Network Attacks (PT0-002)/008 VLAN Hopping (OBJ 3.1)_en.srt 14.3 kB
  • 02 - Planning an Engagement (PT0-002)/006 PenTest Standards (OBJ 1.2)_en.srt 14.2 kB
  • 18 - Communication and Reports (PT0-002)/005 Presentation of Findings (4.1 & OBJ 4.3)_en.srt 14.1 kB
  • 21 - Scripting Basics (PT0-002)/007 Object Oriented Programming (OBJ 5.1)_en.srt 14.0 kB
  • 11 - Application Vulnerabilities (PT0-002)/011 Privilege Escalation (OBJ 3.3)_en.srt 14.0 kB
  • 13 - Cloud Attacks (PT0-002)/002 Attacking the Cloud (OBJ 3.4)_en.srt 13.8 kB
  • 15 - Attacks on Specialized Systems (PT0-002)/009 Virtual Machine Attacks (OBJ 3.5)_en.srt 13.7 kB
  • 10 - Network Attacks (PT0-002)/002 Stress Testing (OBJ 3.1)_en.srt 13.4 kB
  • 09 - Wireless Attacks (PT0-002)/008 Evil Twins (OBJ 3.2)_en.srt 13.4 kB
  • 12 - Application Attacks (PT0-002)/010 XML Injections (OBJ 3.3)_en.srt 13.3 kB
  • 11 - Application Vulnerabilities (PT0-002)/007 Improper Headers (OBJ 3.3)_en.srt 13.2 kB
  • 04 - Passive Reconnaissance (PT0-002)/010 Search Engine Analysis (OBJ 2.1)_en.srt 13.1 kB
  • 18 - Communication and Reports (PT0-002)/002 Communication Paths (OBJ 4.3)_en.srt 12.9 kB
  • 04 - Passive Reconnaissance (PT0-002)/002 Information Gathering (OBJ 2.1)_en.srt 12.9 kB
  • 15 - Attacks on Specialized Systems (PT0-002)/010 Containerization (OBJ 3.5)_en.srt 12.9 kB
  • 10 - Network Attacks (PT0-002)/003 Exploit Resources (OBJ 3.1)_en.srt 12.6 kB
  • 15 - Attacks on Specialized Systems (PT0-002)/007 Data Storage Vulnerabilities (OBJ 3.5)_en.srt 12.5 kB
  • 11 - Application Vulnerabilities (PT0-002)/001 Application Vulnerabilities (OBJ 3.3)_en.srt 12.3 kB
  • 09 - Wireless Attacks (PT0-002)/010 Bluetooth Attacks (OBJ 3.2)_en.srt 12.2 kB
  • 11 - Application Vulnerabilities (PT0-002)/005 Authentication and References (OBJ 3.3)_en.srt 12.2 kB
  • 24 - Tool Round-up (PT0-002)/003 Scanning Tools (OBJ 5.3)_en.srt 12.2 kB
  • 16 - Post-exploitation (PT0-002)/006 Golden Ticket (OBJ 3.7)_en.srt 12.2 kB
  • 04 - Passive Reconnaissance (PT0-002)/013 CWE & CVE (OBJ 2.1)_en.srt 12.1 kB
  • 24 - Tool Round-up (PT0-002)/002 OSINT Tools (OBJ 5.3)_en.srt 12.1 kB
  • 11 - Application Vulnerabilities (PT0-002)/006 Improper Error Handling (OBJ 3.3)_en.srt 12.1 kB
  • 23 - Exploits and Automation (PT0-002)/004 Exploits for Enumerating Users (OBJ 5.2)_en.srt 11.7 kB
  • 04 - Passive Reconnaissance (PT0-002)/009 Public Repositories (OBJ2.1)_en.srt 11.7 kB
  • 11 - Application Vulnerabilities (PT0-002)/004 Buffer Overflow Attacks (OBJ 3.3)_en.srt 11.6 kB
  • 13 - Cloud Attacks (PT0-002)/005 Metadata Service Attack (OBJ 3.4)_en.srt 11.6 kB
  • 11 - Application Vulnerabilities (PT0-002)/002 Race Conditions (OBJ 3.3)_en.srt 11.4 kB
  • 08 - Social Engineering and Physical Attacks (PT0-002)/004 Phishing Campaigns (OBJ 3.6)_en.srt 11.3 kB
  • 16 - Post-exploitation (PT0-002)/010 Upgrading Restrictive Shells (OBJ 3.7)_en.srt 11.2 kB
  • 03 - Scoping an Engagement (PT0-002)/008 Validating the Scope (OBJ 1.2)_en.srt 11.2 kB
  • 10 - Network Attacks (PT0-002)/007 MAC Spoofing (OBJ 3.1)_en.srt 10.9 kB
  • 22 - Analyzing Scripts (PT0-002)/001 Analyzing Scripts (OBJ 5.2)_en.srt 10.9 kB
  • 06 - Vulnerability Scanning (PT0-002)/007 Nikto Scanning (OBJ 2.3 and 2.4)_en.srt 10.7 kB
  • 18 - Communication and Reports (PT0-002)/009 Securing and Storing Reports (OBJ 4.1)_en.srt 10.6 kB
  • 17 - Detection Avoidance (PT0-002)/006 Covert Channels (OBJ 3.7)_en.srt 10.6 kB
  • 14 - Attacks on Mobile Devices (PT0-002)/007 Mobile Device Attacks (OBJ 3.5)_en.srt 10.6 kB
  • 19 - Findings and Remediations (PT0-002)/003 Selecting Security Controls (OBJ 4.2)_en.srt 10.5 kB
  • 14 - Attacks on Mobile Devices (PT0-002)/001 Attacks on Mobile Devices (OBJ 3.5)_en.srt 10.5 kB
  • 21 - Scripting Basics (PT0-002)/004 Loops (OBJ 5.1)_en.srt 10.3 kB
  • 18 - Communication and Reports (PT0-002)/003 Communication Triggers (OBJ 4.3)_en.srt 10.2 kB
  • 10 - Network Attacks (PT0-002)/009 NAC Bypass (OBJ 3.1)_en.srt 10.2 kB
  • 24 - Tool Round-up (PT0-002)/012 Debuggers (OBJ 5.3)_en.srt 10.2 kB
  • 08 - Social Engineering and Physical Attacks (PT0-002)/006 Pretexting (OBJ 3.6)_en.srt 10.0 kB
  • 08 - Social Engineering and Physical Attacks (PT0-002)/008 Impersonation (OBJ 3.6)_en.srt 10.0 kB
  • 07 - Nmap (PT0-002)/004 Nmap Fingerprinting (OBJ 2.3 and 2.4)_en.srt 10.0 kB
  • 09 - Wireless Attacks (PT0-002)/011 RFID and NFC Attacks (OBJ 3.2)_en.srt 10.0 kB
  • 09 - Wireless Attacks (PT0-002)/009 On-path and Relay Attacks (OBJ 3.2)_en.srt 10.0 kB
  • 14 - Attacks on Mobile Devices (PT0-002)/003 Deployment Options (OBJ 3.5)_en.srt 9.8 kB
  • 13 - Cloud Attacks (PT0-002)/007 Auditing the Cloud (OBJ 3.4)_en.srt 9.7 kB
  • 17 - Detection Avoidance (PT0-002)/002 Trojans and Backdoors (OBJ 3.7)_en.srt 9.6 kB
  • 23 - Exploits and Automation (PT0-002)/005 Exploits for Enumerating Assets (OBJ 5.2)_en.srt 9.6 kB
  • 12 - Application Attacks (PT0-002)/011 Other Injection Attacks (OBJ 3.3)_en.srt 8.9 kB
  • 25 - Conclusion (PT0-002)/002 BONUS Where to go from here_en.srt 8.9 kB
  • 08 - Social Engineering and Physical Attacks (PT0-002)/012 Social Engineering Tools (OBJ 3.6)_en.srt 8.9 kB
  • 22 - Analyzing Scripts (PT0-002)/003 Bash Example (OBJ 5.2)_en.srt 8.9 kB
  • 20 - Post-report Activities (PT0-002)/007 Lessons Learned (OBJ 4.2)_en.srt 8.9 kB
  • 01 - Welcome to the Course (PT0-002)/003 Exam Tips_en.srt 8.9 kB
  • 16 - Post-exploitation (PT0-002)/002 Enumerating the Network (OBJ 3.7)_en.srt 8.8 kB
  • 10 - Network Attacks (PT0-002)/006 LLMNRNBT-NS Poisoning (OBJ 3.1)_en.srt 8.7 kB
  • 21 - Scripting Basics (PT0-002)/005 Logic Control (OBJ 5.1)_en.srt 8.7 kB
  • 23 - Exploits and Automation (PT0-002)/002 Exploits to Download Files (OBJ 5.2)_en.srt 8.6 kB
  • 22 - Analyzing Scripts (PT0-002)/013 Ruby Example (OBJ 5.2)_en.srt 8.4 kB
  • 24 - Tool Round-up (PT0-002)/007 Remote Access Tools (OBJ 5.3)_en.srt 8.3 kB
  • 22 - Analyzing Scripts (PT0-002)/007 Python Example (OBJ 5.2)_en.srt 8.1 kB
  • 03 - Scoping an Engagement (PT0-002)/001 Scoping an Engagement (OBJ 1.1, 1.2, and 1.3)_en.srt 8.0 kB
  • 10 - Network Attacks (PT0-002)/010 On-path Attack (OBJ 3.1)_en.srt 8.0 kB
  • 18 - Communication and Reports (PT0-002)/006 Report Data Gathering (OBJ 4.1)_en.srt 7.8 kB
  • 08 - Social Engineering and Physical Attacks (PT0-002)/001 Social Engineering and Physical Attacks (OBJ 3.6)_en.srt 7.8 kB
  • 09 - Wireless Attacks (PT0-002)/001 Wireless Attacks (OBJ 3.2)_en.srt 7.6 kB
  • 09 - Wireless Attacks (PT0-002)/003 Bypassing MAC Filtering (OBJ 3.2)_en.srt 7.5 kB
  • 23 - Exploits and Automation (PT0-002)/006 Automation in Engagements (OBJ 5.2)_en.srt 7.2 kB
  • 16 - Post-exploitation (PT0-002)/004 Lateral Movement and Pivoting (OBJ 3.7)_en.srt 7.0 kB
  • 24 - Tool Round-up (PT0-002)/001 Tool Round-up (OBJ 5.3)_en.srt 6.7 kB
  • 22 - Analyzing Scripts (PT0-002)/005 PowerShell Example (OBJ 5.2)_en.srt 6.6 kB
  • 20 - Post-report Activities (PT0-002)/006 Attestation of Findings (OBJ 4.2)_en.srt 6.4 kB
  • 20 - Post-report Activities (PT0-002)/005 Client Acceptance (OBJ 4.2)_en.srt 6.4 kB
  • 18 - Communication and Reports (PT0-002)/008 Common Themes (OBJ 4.1)_en.srt 6.3 kB
  • 16 - Post-exploitation (PT0-002)/001 Post-exploitation (OBJ 3.7)_en.srt 6.3 kB
  • 12 - Application Attacks (PT0-002)/009 OWASP ZAP (OBJ 3.3)_en.srt 6.2 kB
  • 04 - Passive Reconnaissance (PT0-002)/001 Passive Reconnaissance (OBJ 2.1)_en.srt 6.1 kB
  • 16 - Post-exploitation (PT0-002)/003 Network Segmentation Testing (OBJ 3.7)_en.srt 6.1 kB
  • 12 - Application Attacks (PT0-002)/001 Application Attacks (OBJ 3.3)_en.srt 6.1 kB
  • 20 - Post-report Activities (PT0-002)/002 Removing Shells and Tools (OBJ 4.2)_en.srt 6.1 kB
  • 20 - Post-report Activities (PT0-002)/001 Post-report Activities (OBJ 4.2)_en.srt 6.0 kB
  • 15 - Attacks on Specialized Systems (PT0-002)/001 Attacks on Specialized Systems (OBJ 3.5)_en.srt 5.9 kB
  • 24 - Tool Round-up (PT0-002)/010 Cloud Tools (OBJ 5.3)_en.srt 5.9 kB
  • 17 - Detection Avoidance (PT0-002)/010 Post-Exploitation Tools (OBJ 3.7)_en.srt 5.8 kB
  • 20 - Post-report Activities (PT0-002)/004 Destroy Test Data (OBJ 4.2)_en.srt 5.8 kB
  • 13 - Cloud Attacks (PT0-002)/006 Software Development Kit (SDK) (OBJ 3.4)_en.srt 5.7 kB
  • 02 - Planning an Engagement (PT0-002)/001 Planning an Engagement (OBJ 1.1, 1.2, and 1.3)_en.srt 5.6 kB
  • 07 - Nmap (PT0-002)/001 Nmap (OBJ 2.3 and 2.4)_en.srt 5.6 kB
  • 20 - Post-report Activities (PT0-002)/008 Retesting (OBJ 4.2)_en.srt 5.6 kB
  • 19 - Findings and Remediations (PT0-002)/011 Other Technical Controls (OBJ 4.2)_en.srt 5.5 kB
  • 19 - Findings and Remediations (PT0-002)/001 Findings and Remediations (OBJ 4.2)_en.srt 5.5 kB
  • 10 - Network Attacks (PT0-002)/001 Network Attacks (OBJ 3.1)_en.srt 5.4 kB
  • 24 - Tool Round-up (PT0-002)/006 Social Engineering Tools (OBJ 5.3)_en.srt 5.3 kB
  • 23 - Exploits and Automation (PT0-002)/007 Automation with Nmap Scripts (OBJ 5.2)_en.srt 5.2 kB
  • 24 - Tool Round-up (PT0-002)/004 Networking Tools (OBJ 5.3)_en.srt 5.0 kB
  • 21 - Scripting Basics (PT0-002)/001 Scripting Basics (OBJ 5.1 & OBJ 5.2)_en.srt 4.9 kB
  • 05 - Active Reconnaissance (PT0-002)/001 Active Reconnaissance (OBJ 2.2 and 2.3)_en.srt 4.8 kB
  • 20 - Post-report Activities (PT0-002)/003 Deleting Test Credentials (OBJ 4.2)_en.srt 4.6 kB
  • 24 - Tool Round-up (PT0-002)/009 Web Application Tools (OBJ 5.3)_en.srt 4.5 kB
  • 13 - Cloud Attacks (PT0-002)/001 Cloud Attacks (OBJ 3.4)_en.srt 4.4 kB
  • 18 - Communication and Reports (PT0-002)/001 Communication and Reports (OBJ 4.3)_en.srt 4.4 kB
  • 11 - Application Vulnerabilities (PT0-002)/008 Code Signing (OBJ 3.3)_en.srt 4.4 kB
  • 06 - Vulnerability Scanning (PT0-002)/001 Vulnerability Scanning (OBJ 2.3 and 2.4)_en.srt 4.3 kB
  • 23 - Exploits and Automation (PT0-002)/001 Exploits and Automation (OBJ 5.2)_en.srt 4.0 kB
  • 08 - Social Engineering and Physical Attacks (PT0-002)/010 Lock Picking (OBJ 3.6)_en.srt 3.3 kB
  • 17 - Detection Avoidance (PT0-002)/001 Detection Avoidance (OBJ 3.7)_en.srt 3.1 kB
  • 01 - Welcome to the Course (PT0-002)/002 Download Your Free Study Guide.html 75 Bytes

随机展示

相关说明

本站不存储任何资源内容,只收集BT种子元数据(例如文件名和文件大小)和磁力链接(BT种子标识符),并提供查询服务,是一个完全合法的搜索引擎系统。 网站不提供种子下载服务,用户可以通过第三方链接或磁力链接获取到相关的种子资源。本站也不对BT种子真实性及合法性负责,请用户注意甄别!