:Search:

The Art of Network Penetration Testing Video Edition

Torrent:
Info Hash: B764FDD09726D37B28926E8CAA774399AD223529
Similar Posts:
Uploader: freecoursewb
Source: 1 Logo 1337x
Type: Tutorials
Language: English
Category: Other
Size: 1.2 GB
Added: July 31, 2025, 12:43 a.m.
Peers: Seeders: 2, Leechers: 4 (Last updated: 8 months, 2 weeks ago)
Tracker Data:
Tracker Seeders Leechers Completed
udp://open.stealth.si:80/announce 0 0 0
udp://exodus.desync.com:6969/announce (Failed to scrape UDP tracker) 0 0 0
udp://tracker.cyberia.is:6969/announce (Failed to scrape UDP tracker) 0 0 0
udp://tracker.opentrackr.org:1337/announce 1 1 0
udp://tracker.torrent.eu.org:451/announce 0 0 0
udp://explodie.org:6969/announce 1 1 0
udp://tracker.birkenwald.de:6969/announce 0 2 0
udp://tracker.moeking.me:6969/announce (Failed to scrape UDP tracker) 0 0 0
udp://ipv4.tracker.harry.lu:80/announce (Failed to scrape UDP tracker) 0 0 0
udp://tracker.therarbg.to:6969/announce 0 0 0
Files:
  1. Get Bonus Downloads Here.url 180 bytes
  2. 001. Chapter 1. Network penetration testing.mp4 11.0 MB
  3. 002. Chapter 1. How hackers break in.mp4 7.3 MB
  4. 003. Chapter 1. Adversarial attack simulation - Penetration testing.mp4 15.7 MB
  5. 004. Chapter 1. When a penetration test is least effective.mp4 12.2 MB
  6. 005. Chapter 1. Executing a network penetration test.mp4 27.7 MB
  7. 006. Chapter 1. Setting up your lab environment.mp4 3.2 MB
  8. 007. Chapter 1. Building your own virtual pentest platform.mp4 21.7 MB
  9. 008. Chapter 1. Summary.mp4 2.4 MB
  10. 009. Part 1. Information gathering.mp4 3.3 MB
  11. 010. Chapter 2. Discovering network hosts.mp4 22.6 MB
  12. 011. Chapter 2. Internet Control Message Protocol.mp4 19.7 MB
  13. 012. Chapter 2. Discovering hosts with Nmap.mp4 25.4 MB
  14. 013. Chapter 2. Additional host-discovery methods.mp4 16.5 MB
  15. 014. Chapter 2. Suummary.mp4 1.3 MB
  16. 015. Chapter 3. Discovering network services.mp4 32.0 MB
  17. 016. Chapter 3. Port scanning with Nmap.mp4 45.4 MB
  18. 017. Chapter 3. Parsing XML output with Ruby.mp4 26.2 MB
  19. 018. Chapter 3. Summary.mp4 2.3 MB
  20. 019. Chapter 4. Discovering network vulnerabilities.mp4 18.2 MB
  21. 020. Chapter 4. Discovering patching vulnerabilities.mp4 11.6 MB
  22. 021. Chapter 4. Discovering authentication vulnerabilities.mp4 44.1 MB
  23. 022. Chapter 4. Discovering configuration vulnerabilities.mp4 24.4 MB
  24. 023. Chapter 4. Summary.mp4 2.7 MB
  25. 024. Part 2. Focused penetration.mp4 4.2 MB
  26. 025. Chapter 5. Attacking vulnerable web services.mp4 17.1 MB
  27. 026. Chapter 5. Gaining an initial foothold.mp4 7.3 MB
  28. 027. Chapter 5. Compromising a vulnerable Tomcat server.mp4 21.6 MB
  29. 028. Chapter 5. Interactive vs. non-interactive shells.mp4 5.1 MB
  30. 029. Chapter 5. Upgrading to an interactive shell.mp4 19.2 MB
  31. 030. Chapter 5. Compromising a vulnerable Jenkins server.mp4 5.0 MB
  32. 031. Chapter 5. Summary.mp4 2.3 MB
  33. 032. Chapter 6. Attacking vulnerable database services.mp4 30.7 MB
  34. 033. Chapter 6. Stealing Windows account password hashes.mp4 19.3 MB
  35. 034. Chapter 6. Extracting password hashes with creddump.mp4 9.6 MB
  36. 035. Chapter 6. Summary.mp4 2.3 MB
  37. 036. Chapter 7. Attacking unpatched services.mp4 15.7 MB
  38. 037. Chapter 7. Understanding the typical exploit life cycle.mp4 11.2 MB
  39. 038. Chapter 7. Compromising MS17-010 with Metasploit.mp4 17.4 MB
  40. 039. Chapter 7. The Meterpreter shell payload.mp4 19.6 MB
  41. 040. Chapter 7. Cautions about the public exploit database.mp4 10.8 MB
  42. 041. Chapter 7. Summary.mp4 3.5 MB
  43. 042. Part 3. Post-exploitation and privilege escalation.mp4 3.6 MB
  44. 043. Chapter 8. Windows post-exploitation.mp4 18.0 MB
  45. 044. Chapter 8. Maintaining reliable re-entry with Meterpreter.mp4 12.8 MB
  46. 045. Chapter 8. Harvesting credentials with Mimikatz.mp4 8.5 MB
  47. 046. Chapter 8. Harvesting domain cached credentials.mp4 21.8 MB
  48. 047. Chapter 8. Harvesting credentials from the filesystem.mp4 12.9 MB
  49. 048. Chapter 8. Moving laterally with Pass-the-Hash.mp4 20.5 MB
  50. 049. Chapter 8. Summary.mp4 2.4 MB
  51. 050. Chapter 9. Linux or UNIX post-exploitation.mp4 30.9 MB
  52. 051. Chapter 9. Harvesting credentials.mp4 18.0 MB
  53. 052. Chapter 9. Escalating privileges with SUID binaries.mp4 24.4 MB
  54. 053. Chapter 9. Passing around SSH keys.mp4 17.1 MB
  55. 054. Chapter 9. Summary.mp4 2.1 MB
  56. 055. Chapter 10. Controlling the entire network.mp4 25.9 MB
  57. 056. Chapter 10. Obtaining domain admin privileges.mp4 17.9 MB
  58. 057. Chapter 10. ntds.dit and the keys to the kingdom.mp4 22.7 MB
  59. 058. Chapter 10. Summary.mp4 3.2 MB
  60. 059. Part 4. Documentation.mp4 4.1 MB
  61. 060. Chapter 11. Post-engagement cleanup.mp4 15.7 MB
  62. 061. Chapter 11. Deactivating local user accounts.mp4 6.6 MB
  63. 062. Chapter 11. Removing leftover files from the filesystem.mp4 18.9 MB
  64. 063. Chapter 11. Reversing configuration changes.mp4 15.4 MB
  65. 064. Chapter 11. Closing backdoors.mp4 14.9 MB
  66. 065. Chapter 11. Summary.mp4 2.7 MB
  67. 066. Chapter 12. Writing a solid pentest deliverable.mp4 15.1 MB
  68. 067. Chapter 12. Executive summary.mp4 6.7 MB
  69. 068. Chapter 12. Engagement methodology.mp4 7.1 MB
  70. 069. Chapter 12. Attack narrative.mp4 2.7 MB
  71. 070. Chapter 12. Technical observations.mp4 14.6 MB
  72. 071. Chapter 12. Appendices.mp4 16.9 MB
  73. 072. Chapter 12. Wrapping it up.mp4 11.4 MB
  74. 073. Chapter 12. What now.mp4 4.2 MB
  75. 074. Chapter 12. Summary.mp4 3.3 MB
  76. 075. Appendix A. Building a virtual pentest platform.mp4 11.9 MB
  77. 076. Appendix A. Additional OS dependencies.mp4 11.8 MB
  78. 077. Appendix A. Installing Nmap.mp4 22.6 MB
  79. 078. Appendix A. The Ruby scripting language.mp4 24.8 MB
  80. 079. Appendix A. The Metasploit framework.mp4 24.9 MB
  81. 080. Appendix B. Essential Linux commands.mp4 15.4 MB
  82. 081. Appendix B. tmux.mp4 14.6 MB
  83. 082. Appendix C. Creating the Capsulecorp Pentest lab network.mp4 12.1 MB
  84. 083. Appendix C. Creating the primary Windows servers.mp4 15.9 MB
  85. 084. Appendix C. Creating the Linux servers.mp4 3.4 MB
  86. 085. Appendix D. Capsulecorp internal network penetration test report.mp4 6.8 MB
  87. 086. Appendix D. Engagement methodology.mp4 10.9 MB
  88. 087. Appendix D. Attack narrative.mp4 5.9 MB
  89. 088. Appendix D. Technical observations.mp4 1.7 MB
  90. 089. Appendix D. Appendix 1 - Severity definitions.mp4 3.6 MB
  91. 090. Appendix D. Appendix 2 - Hosts and services.mp4 758.5 KB
  92. 091. Appendix D. Appendix 3 - Tools list.mp4 1.9 MB
  93. 092. Appendix D. Appendix 4 - Additional references.mp4 1.5 MB
  94. 093. Appendix E. Exercise answers.mp4 2.0 MB
  95. 094. Appendix E. Exercise 3.1 - Creating protocol-specific target lists.mp4 3.1 MB
  96. 095. Appendix E. Exercise 4.1 - Identifying missing patches.mp4 922.7 KB
  97. 096. Appendix E. Exercise 4.2 - Creating a client-specific password list.mp4 971.9 KB
  98. 097. Appendix E. Exercise 4.3 - Discovering weak passwords.mp4 2.2 MB
  99. 098. Appendix E. Exercise 5.1 - Deploying a malicious WAR file.mp4 1022.8 KB
  100. 099. Appendix E. Exercise 6.1 Stealing SYSTEM and SAM registry hives.mp4 924.9 KB
  101. 100. Appendix E. Exercise 7.1 - Compromising tien.capsulecorp.local.mp4 746.8 KB
  102. 101. Appendix E. Exercise 8.1 - Accessing your first level-two host.mp4 505.6 KB
  103. 102. Appendix E. Exercise 10.1 - Stealing passwords from ntds.dit.mp4 2.0 MB
  104. 103. Appendix E. Exercise 11.1 - Performing post-engagement cleanup.mp4 1.7 MB
  105. Bonus Resources.txt 70 bytes

Discussion