搜索
CompTIA Pentest+ (Ethical Hacking) Course & Practice Exam - Jason Dion
磁力链接/BT种子名称
CompTIA Pentest+ (Ethical Hacking) Course & Practice Exam - Jason Dion
磁力链接/BT种子简介
种子哈希:
135ec2a9e270c7356545a1c69c91c5d49d946198
文件大小:
11.45G
已经下载:
591
次
下载速度:
极快
收录时间:
2023-12-28
最近下载:
2025-05-31
移花宫入口
移花宫.com
邀月.com
怜星.com
花无缺.com
yhgbt.icu
yhgbt.top
磁力链接下载
magnet:?xt=urn:btih:135EC2A9E270C7356545A1C69C91C5D49D946198
推荐使用
PIKPAK网盘
下载资源,10TB超大空间,不限制资源,无限次数离线下载,视频在线观看
下载BT种子文件
磁力链接
迅雷下载
PIKPAK在线播放
世界之窗
91视频
含羞草
欲漫涩
逼哩逼哩
成人快手
51品茶
抖阴破解版
极乐禁地
91短视频
TikTok成人版
PornHub
草榴社区
91未成年
乱伦巴士
呦乐园
萝莉岛
最近搜索
爆衣
探花熟
翻白眼
多纳泰拉达米亚尼
女同桌
折折
连喷
核电
netgirl
体育生单男
【2025年4月4日】下載及散播兒童色情物品,五國警方展開執法行動,合共拘捕435人
大波波,
国内女警超内涵
pdf editor
[美版]
性教学
推特大神母狗
【台灣刑事局】全台追查,持有兒童色情影片,共拘捕447名疑犯。
大学在读学生妹
舞蹈老师丝袜
天美新作
啪娃
探花
清纯厕
vrkm-1104
はレイプした
抽皮肤
妈妈的
拍摄学生
白票
文件列表
01 - Welcome to the Course (PT0-002)/001 Welcome.mp4
286.4 MB
08 - Social Engineering and Physical Attacks (PT0-002)/009 Physical Security (OBJ 3.6).mp4
209.1 MB
11 - Application Vulnerabilities (PT0-002)/012 Conducting Privilege Escalation (OBJ 3.3).mp4
197.4 MB
05 - Active Reconnaissance (PT0-002)/011 Network Traffic Analysis (OBJ 2.3).mp4
178.8 MB
07 - Nmap (PT0-002)/006 Nmap Scripting Engine (OBJ 2.3 and 2.4).mp4
178.6 MB
04 - Passive Reconnaissance (PT0-002)/006 Using OSINT Tools (OBJ 2.1).mp4
178.5 MB
14 - Attacks on Mobile Devices (PT0-002)/009 Conducting Malware Analysis (OBJ 3.5).mp4
167.5 MB
25 - Conclusion (PT0-002)/001 Conclusion.mp4
142.9 MB
12 - Application Attacks (PT0-002)/012 Attacking Web Applications (OBJ 3.3).mp4
136.2 MB
05 - Active Reconnaissance (PT0-002)/003 Conducting Enumeration (OBJ 2.3).mp4
130.5 MB
18 - Communication and Reports (PT0-002)/007 Written Reports (OBJ 4.1).mp4
124.6 MB
03 - Scoping an Engagement (PT0-002)/003 Adversary Emulation (OBJ 1.2).mp4
121.7 MB
14 - Attacks on Mobile Devices (PT0-002)/005 Mobile Device Insecurity (OBJ 3.5).mp4
121.4 MB
10 - Network Attacks (PT0-002)/013 Intro to Metasploit (OBJ 3.1).mp4
121.0 MB
08 - Social Engineering and Physical Attacks (PT0-002)/003 Social Engineering (OBJ 3.6).mp4
119.9 MB
14 - Attacks on Mobile Devices (PT0-002)/006 Multifactor Authentication (OBJ 3.5).mp4
116.3 MB
19 - Findings and Remediations (PT0-002)/002 Security Control Categories (OBJ 4.2).mp4
114.1 MB
22 - Analyzing Scripts (PT0-002)/009 Perl Example (OBJ 5.2).mp4
113.4 MB
15 - Attacks on Specialized Systems (PT0-002)/006 ICS Protocols and Vulnerabilities (OBJ 3.5).mp4
111.2 MB
04 - Passive Reconnaissance (PT0-002)/008 Reconnaissance with CentralOps (OBJ 2.1).mp4
110.5 MB
13 - Cloud Attacks (PT0-002)/008 Conducting Cloud Audits (OBJ 3.4).mp4
110.2 MB
02 - Planning an Engagement (PT0-002)/009 Regulatory Compliance (OBJ 1.1).mp4
109.6 MB
08 - Social Engineering and Physical Attacks (PT0-002)/005 Social Engineering Toolkit (OBJ 3.6).mp4
109.1 MB
05 - Active Reconnaissance (PT0-002)/008 Eavesdropping (OBJ 2.2).mp4
108.1 MB
11 - Application Vulnerabilities (PT0-002)/009 Vulnerable Components (OBJ 3.3).mp4
106.7 MB
03 - Scoping an Engagement (PT0-002)/010 Build a Virtual Lab.mp4
106.6 MB
12 - Application Attacks (PT0-002)/008 Burp Suite and SQLmap (OBJ 3.3).mp4
102.9 MB
16 - Post-exploitation (PT0-002)/009 Escalating Privileges (OBJ 3.7).mp4
102.8 MB
08 - Social Engineering and Physical Attacks (PT0-002)/002 Methods of Influence (OBJ 3.6).mp4
102.8 MB
04 - Passive Reconnaissance (PT0-002)/011 URL Analysis (OBJ 2.1).mp4
100.9 MB
19 - Findings and Remediations (PT0-002)/012 Mitigation Strategies (OBJ 4.2).mp4
100.7 MB
22 - Analyzing Scripts (PT0-002)/010 Coding in JavaScript (OBJ 5.2).mp4
100.0 MB
02 - Planning an Engagement (PT0-002)/002 Risk (OBJ 1.2).mp4
97.2 MB
07 - Nmap (PT0-002)/005 Using Nmap (OBJ 2.3 and 2.4).mp4
90.6 MB
14 - Attacks on Mobile Devices (PT0-002)/008 Malware Analysis (OBJ 3.5).mp4
90.2 MB
15 - Attacks on Specialized Systems (PT0-002)/002 Internet of Things (IoT) Devices (OBJ 3.5).mp4
89.4 MB
19 - Findings and Remediations (PT0-002)/004 Physical Controls (OBJ 4.2).mp4
87.3 MB
03 - Scoping an Engagement (PT0-002)/006 Rules of Engagement (OBJ 1.2).mp4
86.7 MB
10 - Network Attacks (PT0-002)/011 Password Attacks (OBJ 3.1).mp4
85.7 MB
03 - Scoping an Engagement (PT0-002)/005 Identifying Restrictions (OBJ 1.1).mp4
85.2 MB
05 - Active Reconnaissance (PT0-002)/009 Wardriving (OBJ 2.2).mp4
85.2 MB
09 - Wireless Attacks (PT0-002)/007 WPS PIN Attacks (OBJ 3.2).mp4
84.6 MB
22 - Analyzing Scripts (PT0-002)/002 Coding in Bash (OBJ 5.2).mp4
83.3 MB
03 - Scoping an Engagement (PT0-002)/004 Target List (OBJ 1.2).mp4
83.2 MB
11 - Application Vulnerabilities (PT0-002)/010 Software Composition (OBJ 3.3).mp4
82.8 MB
06 - Vulnerability Scanning (PT0-002)/006 OpenVas Scanning (OBJ 2.3 and 2.4).mp4
80.8 MB
06 - Vulnerability Scanning (PT0-002)/004 Scanning Considerations (OBJ 2.3 and 2.4).mp4
78.9 MB
22 - Analyzing Scripts (PT0-002)/004 Coding in PowerShell (OBJ 5.2).mp4
78.3 MB
06 - Vulnerability Scanning (PT0-002)/005 Nessus Scanning (OBJ 2.3 and 2.4).mp4
77.5 MB
22 - Analyzing Scripts (PT0-002)/006 Coding in Python (OBJ 5.2).mp4
75.2 MB
19 - Findings and Remediations (PT0-002)/006 Administrative Controls (OBJ 4.2).mp4
75.2 MB
02 - Planning an Engagement (PT0-002)/003 Risk Handling (OBJ 1.2).mp4
74.5 MB
17 - Detection Avoidance (PT0-002)/009 Persistence and Covering Your Tracks (OBJ 3.7).mp4
73.3 MB
14 - Attacks on Mobile Devices (PT0-002)/004 Mobile Reconnaissance Concerns (OBJ 3.5).mp4
72.7 MB
16 - Post-exploitation (PT0-002)/007 Lateral Movement (OBJ 3.7).mp4
72.7 MB
19 - Findings and Remediations (PT0-002)/005 Operational Controls (OBJ 4.2).mp4
72.0 MB
04 - Passive Reconnaissance (PT0-002)/004 Social Media Scraping (OBJ 2.1).mp4
72.0 MB
02 - Planning an Engagement (PT0-002)/010 Professionalism (OBJ 1.3).mp4
70.7 MB
06 - Vulnerability Scanning (PT0-002)/003 Vulnerability Scans (OBJ 2.3 and 2.4).mp4
70.4 MB
12 - Application Attacks (PT0-002)/002 Directory Traversals (OBJ 3.3).mp4
70.3 MB
17 - Detection Avoidance (PT0-002)/004 Living Off the Land (OBJ 3.7).mp4
69.9 MB
02 - Planning an Engagement (PT0-002)/007 Planning a Test (OBJ 1.2).mp4
69.9 MB
18 - Communication and Reports (PT0-002)/005 Presentation of Findings (4.1 & OBJ 4.3).mp4
68.4 MB
06 - Vulnerability Scanning (PT0-002)/007 Nikto Scanning (OBJ 2.3 and 2.4).mp4
67.7 MB
22 - Analyzing Scripts (PT0-002)/008 Coding in Perl (OBJ 5.2).mp4
67.3 MB
05 - Active Reconnaissance (PT0-002)/010 DNS and ARP Analysis (OBJ 2.3).mp4
66.2 MB
04 - Passive Reconnaissance (PT0-002)/012 Cryptographic Flaws (OBJ 2.1).mp4
65.9 MB
14 - Attacks on Mobile Devices (PT0-002)/002 Enterprise Mobility Management (OBJ 3.5).mp4
65.1 MB
03 - Scoping an Engagement (PT0-002)/002 Defining the Scope (OBJ 1.2).mp4
65.0 MB
04 - Passive Reconnaissance (PT0-002)/005 OSINT Tools (OBJ 2.1).mp4
64.4 MB
18 - Communication and Reports (PT0-002)/004 Reasons for Communication (OBJ 4.3).mp4
63.6 MB
15 - Attacks on Specialized Systems (PT0-002)/005 ICS and SCADA Devices (OBJ 3.5).mp4
62.8 MB
13 - Cloud Attacks (PT0-002)/004 Misconfigured Assets (OBJ 3.4).mp4
62.6 MB
05 - Active Reconnaissance (PT0-002)/007 Packet Crafting (OBJ 2.2).mp4
62.5 MB
24 - Tool Round-up (PT0-002)/013 Miscellaneous Tools (OBJ 5.3).mp4
62.0 MB
02 - Planning an Engagement (PT0-002)/008 Legal Concepts (OBJ 1.1).mp4
61.5 MB
04 - Passive Reconnaissance (PT0-002)/007 DNS Information (OBJ 2.1).mp4
60.9 MB
03 - Scoping an Engagement (PT0-002)/009 Limitations and Permission (OBJ 1.1 and 1.3).mp4
59.9 MB
02 - Planning an Engagement (PT0-002)/004 Controls (OBJ 1.2).mp4
59.8 MB
17 - Detection Avoidance (PT0-002)/003 Creating Persistence (OBJ 3.7).mp4
58.7 MB
19 - Findings and Remediations (PT0-002)/010 Digital Certificates (OBJ 4.2).mp4
58.2 MB
09 - Wireless Attacks (PT0-002)/004 Signal Exploitation (OBJ 3.2).mp4
57.3 MB
09 - Wireless Attacks (PT0-002)/002 Wireless Security (OBJ 3.2).mp4
57.1 MB
11 - Application Vulnerabilities (PT0-002)/003 Buffer Overflows (OBJ 3.3).mp4
56.5 MB
08 - Social Engineering and Physical Attacks (PT0-002)/007 Baiting Victims (OBJ 3.6).mp4
54.4 MB
24 - Tool Round-up (PT0-002)/011 Steganography Tools (OBJ 5.3).mp4
53.3 MB
05 - Active Reconnaissance (PT0-002)/006 Detecting and Evading Defenses (OBJ 2.2).mp4
52.5 MB
24 - Tool Round-up (PT0-002)/005 Wireless Tools (OBJ 5.3).mp4
52.1 MB
22 - Analyzing Scripts (PT0-002)/012 Coding in Ruby (OBJ 5.2).mp4
52.0 MB
05 - Active Reconnaissance (PT0-002)/005 Website Reconnaissance (OBJ 2.3).mp4
52.0 MB
21 - Scripting Basics (PT0-002)/002 Scripting Tools (OBJ 5.2).mp4
51.8 MB
03 - Scoping an Engagement (PT0-002)/007 Assessment Types (OBJ 1.3).mp4
51.5 MB
06 - Vulnerability Scanning (PT0-002)/002 Vulnerability Lifecycle (OBJ 2.3 and 2.4).mp4
50.9 MB
08 - Social Engineering and Physical Attacks (PT0-002)/006 Pretexting (OBJ 3.6).mp4
50.1 MB
04 - Passive Reconnaissance (PT0-002)/003 Open-Source Intelligence (OSINT) (OBJ 2.1).mp4
49.3 MB
24 - Tool Round-up (PT0-002)/008 Credential Testing Tools (OBJ 5.3).mp4
48.9 MB
11 - Application Vulnerabilities (PT0-002)/005 Authentication and References (OBJ 3.3).mp4
47.3 MB
10 - Network Attacks (PT0-002)/009 NAC Bypass (OBJ 3.1).mp4
47.0 MB
15 - Attacks on Specialized Systems (PT0-002)/003 Internet of Things (IoT) Vulnerabilities (OBJ 3.5).mp4
46.3 MB
07 - Nmap (PT0-002)/002 Nmap Discovery Scans (OBJ 2.3 and 2.4).mp4
46.2 MB
22 - Analyzing Scripts (PT0-002)/011 JavaScript Example (OBJ 5.2).mp4
46.2 MB
24 - Tool Round-up (PT0-002)/012 Debuggers (OBJ 5.3).mp4
46.2 MB
05 - Active Reconnaissance (PT0-002)/002 Scanning and Enumeration (OBJ 2.2 and 2.3).mp4
45.8 MB
09 - Wireless Attacks (PT0-002)/010 Bluetooth Attacks (OBJ 3.2).mp4
45.6 MB
10 - Network Attacks (PT0-002)/003 Exploit Resources (OBJ 3.1).mp4
45.3 MB
15 - Attacks on Specialized Systems (PT0-002)/007 Data Storage Vulnerabilities (OBJ 3.5).mp4
44.9 MB
03 - Scoping an Engagement (PT0-002)/008 Validating the Scope (OBJ 1.2).mp4
44.1 MB
09 - Wireless Attacks (PT0-002)/005 WEP Hacking (OBJ 3.2).mp4
44.1 MB
13 - Cloud Attacks (PT0-002)/003 Credential Harvesting (OBJ 3.4).mp4
43.3 MB
21 - Scripting Basics (PT0-002)/003 Variables (OBJ 5.1).mp4
43.3 MB
15 - Attacks on Specialized Systems (PT0-002)/008 Virtual Environments (OBJ 3.5).mp4
43.3 MB
19 - Findings and Remediations (PT0-002)/009 Implementing MFA (OBJ 4.2).mp4
43.2 MB
04 - Passive Reconnaissance (PT0-002)/002 Information Gathering (OBJ 2.1).mp4
42.6 MB
08 - Social Engineering and Physical Attacks (PT0-002)/008 Impersonation (OBJ 3.6).mp4
41.8 MB
16 - Post-exploitation (PT0-002)/005 Pass the Hash (OBJ 3.7).mp4
41.3 MB
15 - Attacks on Specialized Systems (PT0-002)/010 Containerization (OBJ 3.5).mp4
40.7 MB
17 - Detection Avoidance (PT0-002)/005 Data Exfiltration (OBJ 3.7).mp4
40.3 MB
02 - Planning an Engagement (PT0-002)/006 PenTest Standards (OBJ 1.2).mp4
40.3 MB
24 - Tool Round-up (PT0-002)/003 Scanning Tools (OBJ 5.3).mp4
40.1 MB
19 - Findings and Remediations (PT0-002)/003 Selecting Security Controls (OBJ 4.2).mp4
40.0 MB
15 - Attacks on Specialized Systems (PT0-002)/009 Virtual Machine Attacks (OBJ 3.5).mp4
39.3 MB
12 - Application Attacks (PT0-002)/005 Cross-Site Request Forgery (CSRF) (OBJ 3.3).mp4
39.2 MB
04 - Passive Reconnaissance (PT0-002)/013 CWE & CVE (OBJ 2.1).mp4
39.1 MB
09 - Wireless Attacks (PT0-002)/011 RFID and NFC Attacks (OBJ 3.2).mp4
38.0 MB
24 - Tool Round-up (PT0-002)/002 OSINT Tools (OBJ 5.3).mp4
37.7 MB
12 - Application Attacks (PT0-002)/007 Conducting SQL Injections (OBJ 3.3).mp4
37.7 MB
18 - Communication and Reports (PT0-002)/002 Communication Paths (OBJ 4.3).mp4
37.0 MB
23 - Exploits and Automation (PT0-002)/003 Exploits for Remote Access (OBJ 5.2).mp4
36.8 MB
08 - Social Engineering and Physical Attacks (PT0-002)/012 Social Engineering Tools (OBJ 3.6).mp4
36.4 MB
16 - Post-exploitation (PT0-002)/008 Pivoting (3.7).mp4
36.1 MB
04 - Passive Reconnaissance (PT0-002)/009 Public Repositories (OBJ2.1).mp4
34.3 MB
10 - Network Attacks (PT0-002)/012 Pass the Hash (OBJ 3.1).mp4
34.3 MB
10 - Network Attacks (PT0-002)/002 Stress Testing (OBJ 3.1).mp4
33.9 MB
11 - Application Vulnerabilities (PT0-002)/001 Application Vulnerabilities (OBJ 3.3).mp4
33.5 MB
19 - Findings and Remediations (PT0-002)/007 System Hardening (OBJ 4.2).mp4
32.8 MB
22 - Analyzing Scripts (PT0-002)/001 Analyzing Scripts (OBJ 5.2).mp4
32.8 MB
21 - Scripting Basics (PT0-002)/006 Data Structures (OBJ 5.1).mp4
32.7 MB
09 - Wireless Attacks (PT0-002)/006 WPAWPA2 Hacking (OBJ 3.2).mp4
32.5 MB
10 - Network Attacks (PT0-002)/008 VLAN Hopping (OBJ 3.1).mp4
32.4 MB
18 - Communication and Reports (PT0-002)/003 Communication Triggers (OBJ 4.3).mp4
32.4 MB
10 - Network Attacks (PT0-002)/007 MAC Spoofing (OBJ 3.1).mp4
32.2 MB
09 - Wireless Attacks (PT0-002)/008 Evil Twins (OBJ 3.2).mp4
32.1 MB
04 - Passive Reconnaissance (PT0-002)/001 Passive Reconnaissance (OBJ 2.1).mp4
31.9 MB
17 - Detection Avoidance (PT0-002)/008 Covering Your Tracks (OBJ 3.7).mp4
31.8 MB
08 - Social Engineering and Physical Attacks (PT0-002)/011 Physical Attacks (OBJ 3.6).mp4
30.9 MB
14 - Attacks on Mobile Devices (PT0-002)/003 Deployment Options (OBJ 3.5).mp4
30.5 MB
10 - Network Attacks (PT0-002)/001 Network Attacks (OBJ 3.1).mp4
30.4 MB
20 - Post-report Activities (PT0-002)/007 Lessons Learned (OBJ 4.2).mp4
30.3 MB
10 - Network Attacks (PT0-002)/004 ARP Poisoning (OBJ 3.1).mp4
30.0 MB
10 - Network Attacks (PT0-002)/005 DNS Cache Poisoning (OBJ 3.1).mp4
29.7 MB
14 - Attacks on Mobile Devices (PT0-002)/001 Attacks on Mobile Devices (OBJ 3.5).mp4
29.6 MB
11 - Application Vulnerabilities (PT0-002)/002 Race Conditions (OBJ 3.3).mp4
29.3 MB
07 - Nmap (PT0-002)/003 Nmap Port Scans (OBJ 2.3 and 2.4).mp4
28.9 MB
11 - Application Vulnerabilities (PT0-002)/004 Buffer Overflow Attacks (OBJ 3.3).mp4
28.7 MB
02 - Planning an Engagement (PT0-002)/005 PenTest Methodologies (OBJ 1.2).mp4
28.5 MB
16 - Post-exploitation (PT0-002)/010 Upgrading Restrictive Shells (OBJ 3.7).mp4
28.4 MB
05 - Active Reconnaissance (PT0-002)/004 Other Enumeration (OBJ 2.2 and 2.3).mp4
28.3 MB
17 - Detection Avoidance (PT0-002)/002 Trojans and Backdoors (OBJ 3.7).mp4
27.9 MB
22 - Analyzing Scripts (PT0-002)/005 PowerShell Example (OBJ 5.2).mp4
27.9 MB
12 - Application Attacks (PT0-002)/003 Dirbuster (OBJ 3.3).mp4
27.2 MB
12 - Application Attacks (PT0-002)/004 Cross-Site Scripting (XSS) (OBJ 3.3).mp4
27.1 MB
13 - Cloud Attacks (PT0-002)/007 Auditing the Cloud (OBJ 3.4).mp4
26.8 MB
20 - Post-report Activities (PT0-002)/006 Attestation of Findings (OBJ 4.2).mp4
26.5 MB
21 - Scripting Basics (PT0-002)/007 Object Oriented Programming (OBJ 5.1).mp4
26.3 MB
16 - Post-exploitation (PT0-002)/002 Enumerating the Network (OBJ 3.7).mp4
26.0 MB
07 - Nmap (PT0-002)/004 Nmap Fingerprinting (OBJ 2.3 and 2.4).mp4
25.6 MB
13 - Cloud Attacks (PT0-002)/002 Attacking the Cloud (OBJ 3.4).mp4
25.6 MB
24 - Tool Round-up (PT0-002)/007 Remote Access Tools (OBJ 5.3).mp4
25.4 MB
08 - Social Engineering and Physical Attacks (PT0-002)/004 Phishing Campaigns (OBJ 3.6).mp4
25.2 MB
16 - Post-exploitation (PT0-002)/003 Network Segmentation Testing (OBJ 3.7).mp4
25.2 MB
13 - Cloud Attacks (PT0-002)/005 Metadata Service Attack (OBJ 3.4).mp4
24.8 MB
12 - Application Attacks (PT0-002)/010 XML Injections (OBJ 3.3).mp4
24.8 MB
19 - Findings and Remediations (PT0-002)/008 Secure Coding (OBJ 4.2).mp4
24.7 MB
20 - Post-report Activities (PT0-002)/005 Client Acceptance (OBJ 4.2).mp4
24.5 MB
10 - Network Attacks (PT0-002)/006 LLMNRNBT-NS Poisoning (OBJ 3.1).mp4
24.1 MB
10 - Network Attacks (PT0-002)/015 Using Netcat (OBJ 3.1).mp4
23.2 MB
15 - Attacks on Specialized Systems (PT0-002)/004 Embedded Systems (OBJ 3.5).mp4
23.1 MB
11 - Application Vulnerabilities (PT0-002)/007 Improper Headers (OBJ 3.3).mp4
22.7 MB
14 - Attacks on Mobile Devices (PT0-002)/007 Mobile Device Attacks (OBJ 3.5).mp4
22.5 MB
18 - Communication and Reports (PT0-002)/009 Securing and Storing Reports (OBJ 4.1).mp4
22.3 MB
12 - Application Attacks (PT0-002)/009 OWASP ZAP (OBJ 3.3).mp4
22.2 MB
23 - Exploits and Automation (PT0-002)/006 Automation in Engagements (OBJ 5.2).mp4
22.2 MB
08 - Social Engineering and Physical Attacks (PT0-002)/001 Social Engineering and Physical Attacks (OBJ 3.6).mp4
21.7 MB
09 - Wireless Attacks (PT0-002)/003 Bypassing MAC Filtering (OBJ 3.2).mp4
21.0 MB
14 - Attacks on Mobile Devices (PT0-002)/010 Mobile Device Tools (OBJ 3.5).mp4
20.2 MB
22 - Analyzing Scripts (PT0-002)/013 Ruby Example (OBJ 5.2).mp4
20.0 MB
12 - Application Attacks (PT0-002)/006 SQL Injections (OBJ 3.3).mp4
20.0 MB
10 - Network Attacks (PT0-002)/014 Netcat (OBJ 3.1).mp4
19.5 MB
22 - Analyzing Scripts (PT0-002)/003 Bash Example (OBJ 5.2).mp4
19.5 MB
16 - Post-exploitation (PT0-002)/006 Golden Ticket (OBJ 3.7).mp4
18.2 MB
23 - Exploits and Automation (PT0-002)/005 Exploits for Enumerating Assets (OBJ 5.2).mp4
17.9 MB
23 - Exploits and Automation (PT0-002)/004 Exploits for Enumerating Users (OBJ 5.2).mp4
17.8 MB
24 - Tool Round-up (PT0-002)/009 Web Application Tools (OBJ 5.3).mp4
17.0 MB
18 - Communication and Reports (PT0-002)/006 Report Data Gathering (OBJ 4.1).mp4
16.8 MB
04 - Passive Reconnaissance (PT0-002)/010 Search Engine Analysis (OBJ 2.1).mp4
16.7 MB
24 - Tool Round-up (PT0-002)/004 Networking Tools (OBJ 5.3).mp4
16.6 MB
22 - Analyzing Scripts (PT0-002)/007 Python Example (OBJ 5.2).mp4
16.6 MB
09 - Wireless Attacks (PT0-002)/001 Wireless Attacks (OBJ 3.2).mp4
16.0 MB
17 - Detection Avoidance (PT0-002)/007 Steganography (3.7).mp4
16.0 MB
11 - Application Vulnerabilities (PT0-002)/011 Privilege Escalation (OBJ 3.3).mp4
15.8 MB
11 - Application Vulnerabilities (PT0-002)/008 Code Signing (OBJ 3.3).mp4
15.7 MB
23 - Exploits and Automation (PT0-002)/002 Exploits to Download Files (OBJ 5.2).mp4
15.3 MB
24 - Tool Round-up (PT0-002)/006 Social Engineering Tools (OBJ 5.3).mp4
15.2 MB
20 - Post-report Activities (PT0-002)/002 Removing Shells and Tools (OBJ 4.2).mp4
15.0 MB
17 - Detection Avoidance (PT0-002)/006 Covert Channels (OBJ 3.7).mp4
14.3 MB
11 - Application Vulnerabilities (PT0-002)/006 Improper Error Handling (OBJ 3.3).mp4
14.0 MB
21 - Scripting Basics (PT0-002)/005 Logic Control (OBJ 5.1).mp4
13.9 MB
16 - Post-exploitation (PT0-002)/004 Lateral Movement and Pivoting (OBJ 3.7).mp4
13.5 MB
23 - Exploits and Automation (PT0-002)/007 Automation with Nmap Scripts (OBJ 5.2).mp4
13.5 MB
24 - Tool Round-up (PT0-002)/001 Tool Round-up (OBJ 5.3).mp4
13.3 MB
25 - Conclusion (PT0-002)/002 BONUS Where to go from here.mp4
13.1 MB
15 - Attacks on Specialized Systems (PT0-002)/001 Attacks on Specialized Systems (OBJ 3.5).mp4
13.1 MB
10 - Network Attacks (PT0-002)/010 On-path Attack (OBJ 3.1).mp4
12.8 MB
20 - Post-report Activities (PT0-002)/001 Post-report Activities (OBJ 4.2).mp4
12.6 MB
12 - Application Attacks (PT0-002)/001 Application Attacks (OBJ 3.3).mp4
12.4 MB
24 - Tool Round-up (PT0-002)/010 Cloud Tools (OBJ 5.3).mp4
12.2 MB
01 - Welcome to the Course (PT0-002)/003 Exam Tips.mp4
11.8 MB
19 - Findings and Remediations (PT0-002)/001 Findings and Remediations (OBJ 4.2).mp4
11.7 MB
21 - Scripting Basics (PT0-002)/004 Loops (OBJ 5.1).mp4
11.2 MB
09 - Wireless Attacks (PT0-002)/009 On-path and Relay Attacks (OBJ 3.2).mp4
11.1 MB
03 - Scoping an Engagement (PT0-002)/001 Scoping an Engagement (OBJ 1.1, 1.2, and 1.3).mp4
11.0 MB
02 - Planning an Engagement (PT0-002)/001 Planning an Engagement (OBJ 1.1, 1.2, and 1.3).mp4
10.9 MB
05 - Active Reconnaissance (PT0-002)/001 Active Reconnaissance (OBJ 2.2 and 2.3).mp4
10.7 MB
20 - Post-report Activities (PT0-002)/008 Retesting (OBJ 4.2).mp4
10.3 MB
12 - Application Attacks (PT0-002)/011 Other Injection Attacks (OBJ 3.3).mp4
10.2 MB
08 - Social Engineering and Physical Attacks (PT0-002)/010 Lock Picking (OBJ 3.6).mp4
10.2 MB
19 - Findings and Remediations (PT0-002)/011 Other Technical Controls (OBJ 4.2).mp4
10.1 MB
20 - Post-report Activities (PT0-002)/003 Deleting Test Credentials (OBJ 4.2).mp4
10.1 MB
23 - Exploits and Automation (PT0-002)/001 Exploits and Automation (OBJ 5.2).mp4
9.8 MB
20 - Post-report Activities (PT0-002)/004 Destroy Test Data (OBJ 4.2).mp4
9.8 MB
18 - Communication and Reports (PT0-002)/008 Common Themes (OBJ 4.1).mp4
9.1 MB
06 - Vulnerability Scanning (PT0-002)/001 Vulnerability Scanning (OBJ 2.3 and 2.4).mp4
9.1 MB
16 - Post-exploitation (PT0-002)/001 Post-exploitation (OBJ 3.7).mp4
8.9 MB
13 - Cloud Attacks (PT0-002)/006 Software Development Kit (SDK) (OBJ 3.4).mp4
8.7 MB
17 - Detection Avoidance (PT0-002)/010 Post-Exploitation Tools (OBJ 3.7).mp4
8.4 MB
07 - Nmap (PT0-002)/001 Nmap (OBJ 2.3 and 2.4).mp4
8.0 MB
21 - Scripting Basics (PT0-002)/001 Scripting Basics (OBJ 5.1 & OBJ 5.2).mp4
7.5 MB
13 - Cloud Attacks (PT0-002)/001 Cloud Attacks (OBJ 3.4).mp4
6.9 MB
01 - Welcome to the Course (PT0-002)/002 CompTIA-PenTest-PT0-002-Study-Notes.pdf
6.8 MB
18 - Communication and Reports (PT0-002)/001 Communication and Reports (OBJ 4.3).mp4
5.6 MB
17 - Detection Avoidance (PT0-002)/001 Detection Avoidance (OBJ 3.7).mp4
5.0 MB
01 - Welcome to the Course (PT0-002)/002 PenTest-PT0-002-Objectives.pdf
155.1 kB
04 - Passive Reconnaissance (PT0-002)/006 Using OSINT Tools (OBJ 2.1)_en.srt
58.7 kB
05 - Active Reconnaissance (PT0-002)/010 DNS and ARP Analysis (OBJ 2.3)_en.srt
52.2 kB
14 - Attacks on Mobile Devices (PT0-002)/009 Conducting Malware Analysis (OBJ 3.5)_en.srt
48.0 kB
22 - Analyzing Scripts (PT0-002)/006 Coding in Python (OBJ 5.2)_en.srt
40.2 kB
07 - Nmap (PT0-002)/006 Nmap Scripting Engine (OBJ 2.3 and 2.4)_en.srt
39.3 kB
16 - Post-exploitation (PT0-002)/009 Escalating Privileges (OBJ 3.7)_en.srt
39.0 kB
22 - Analyzing Scripts (PT0-002)/002 Coding in Bash (OBJ 5.2)_en.srt
37.0 kB
08 - Social Engineering and Physical Attacks (PT0-002)/009 Physical Security (OBJ 3.6)_en.srt
36.6 kB
03 - Scoping an Engagement (PT0-002)/010 Build a Virtual Lab_en.srt
36.6 kB
05 - Active Reconnaissance (PT0-002)/011 Network Traffic Analysis (OBJ 2.3)_en.srt
36.1 kB
10 - Network Attacks (PT0-002)/013 Intro to Metasploit (OBJ 3.1)_en.srt
36.0 kB
04 - Passive Reconnaissance (PT0-002)/012 Cryptographic Flaws (OBJ 2.1)_en.srt
35.2 kB
09 - Wireless Attacks (PT0-002)/002 Wireless Security (OBJ 3.2)_en.srt
33.6 kB
12 - Application Attacks (PT0-002)/012 Attacking Web Applications (OBJ 3.3)_en.srt
33.4 kB
22 - Analyzing Scripts (PT0-002)/010 Coding in JavaScript (OBJ 5.2)_en.srt
33.1 kB
14 - Attacks on Mobile Devices (PT0-002)/008 Malware Analysis (OBJ 3.5)_en.srt
32.7 kB
04 - Passive Reconnaissance (PT0-002)/011 URL Analysis (OBJ 2.1)_en.srt
32.7 kB
19 - Findings and Remediations (PT0-002)/006 Administrative Controls (OBJ 4.2)_en.srt
32.0 kB
22 - Analyzing Scripts (PT0-002)/008 Coding in Perl (OBJ 5.2)_en.srt
32.0 kB
18 - Communication and Reports (PT0-002)/007 Written Reports (OBJ 4.1)_en.srt
31.8 kB
08 - Social Engineering and Physical Attacks (PT0-002)/003 Social Engineering (OBJ 3.6)_en.srt
31.6 kB
02 - Planning an Engagement (PT0-002)/009 Regulatory Compliance (OBJ 1.1)_en.srt
31.5 kB
05 - Active Reconnaissance (PT0-002)/003 Conducting Enumeration (OBJ 2.3)_en.srt
30.7 kB
22 - Analyzing Scripts (PT0-002)/009 Perl Example (OBJ 5.2)_en.srt
30.2 kB
06 - Vulnerability Scanning (PT0-002)/006 OpenVas Scanning (OBJ 2.3 and 2.4)_en.srt
29.4 kB
08 - Social Engineering and Physical Attacks (PT0-002)/005 Social Engineering Toolkit (OBJ 3.6)_en.srt
29.2 kB
19 - Findings and Remediations (PT0-002)/002 Security Control Categories (OBJ 4.2)_en.srt
28.9 kB
22 - Analyzing Scripts (PT0-002)/004 Coding in PowerShell (OBJ 5.2)_en.srt
28.8 kB
13 - Cloud Attacks (PT0-002)/008 Conducting Cloud Audits (OBJ 3.4)_en.srt
28.7 kB
22 - Analyzing Scripts (PT0-002)/012 Coding in Ruby (OBJ 5.2)_en.srt
27.9 kB
14 - Attacks on Mobile Devices (PT0-002)/005 Mobile Device Insecurity (OBJ 3.5)_en.srt
27.6 kB
14 - Attacks on Mobile Devices (PT0-002)/006 Multifactor Authentication (OBJ 3.5)_en.srt
27.5 kB
01 - Welcome to the Course (PT0-002)/001 Welcome_en.srt
27.4 kB
08 - Social Engineering and Physical Attacks (PT0-002)/002 Methods of Influence (OBJ 3.6)_en.srt
26.9 kB
04 - Passive Reconnaissance (PT0-002)/008 Reconnaissance with CentralOps (OBJ 2.1)_en.srt
26.8 kB
09 - Wireless Attacks (PT0-002)/004 Signal Exploitation (OBJ 3.2)_en.srt
26.8 kB
19 - Findings and Remediations (PT0-002)/007 System Hardening (OBJ 4.2)_en.srt
26.6 kB
11 - Application Vulnerabilities (PT0-002)/003 Buffer Overflows (OBJ 3.3)_en.srt
26.5 kB
17 - Detection Avoidance (PT0-002)/004 Living Off the Land (OBJ 3.7)_en.srt
26.5 kB
17 - Detection Avoidance (PT0-002)/003 Creating Persistence (OBJ 3.7)_en.srt
26.3 kB
11 - Application Vulnerabilities (PT0-002)/012 Conducting Privilege Escalation (OBJ 3.3)_en.srt
26.3 kB
25 - Conclusion (PT0-002)/001 Conclusion_en.srt
25.9 kB
03 - Scoping an Engagement (PT0-002)/003 Adversary Emulation (OBJ 1.2)_en.srt
25.6 kB
19 - Findings and Remediations (PT0-002)/005 Operational Controls (OBJ 4.2)_en.srt
25.5 kB
13 - Cloud Attacks (PT0-002)/004 Misconfigured Assets (OBJ 3.4)_en.srt
25.3 kB
10 - Network Attacks (PT0-002)/005 DNS Cache Poisoning (OBJ 3.1)_en.srt
25.3 kB
15 - Attacks on Specialized Systems (PT0-002)/006 ICS Protocols and Vulnerabilities (OBJ 3.5)_en.srt
25.2 kB
04 - Passive Reconnaissance (PT0-002)/005 OSINT Tools (OBJ 2.1)_en.srt
24.8 kB
06 - Vulnerability Scanning (PT0-002)/003 Vulnerability Scans (OBJ 2.3 and 2.4)_en.srt
24.6 kB
04 - Passive Reconnaissance (PT0-002)/004 Social Media Scraping (OBJ 2.1)_en.srt
24.5 kB
08 - Social Engineering and Physical Attacks (PT0-002)/011 Physical Attacks (OBJ 3.6)_en.srt
24.4 kB
11 - Application Vulnerabilities (PT0-002)/009 Vulnerable Components (OBJ 3.3)_en.srt
24.3 kB
03 - Scoping an Engagement (PT0-002)/004 Target List (OBJ 1.2)_en.srt
24.3 kB
18 - Communication and Reports (PT0-002)/004 Reasons for Communication (OBJ 4.3)_en.srt
23.8 kB
09 - Wireless Attacks (PT0-002)/007 WPS PIN Attacks (OBJ 3.2)_en.srt
23.2 kB
02 - Planning an Engagement (PT0-002)/010 Professionalism (OBJ 1.3)_en.srt
23.1 kB
21 - Scripting Basics (PT0-002)/006 Data Structures (OBJ 5.1)_en.srt
23.0 kB
04 - Passive Reconnaissance (PT0-002)/007 DNS Information (OBJ 2.1)_en.srt
22.9 kB
05 - Active Reconnaissance (PT0-002)/008 Eavesdropping (OBJ 2.2)_en.srt
22.9 kB
05 - Active Reconnaissance (PT0-002)/005 Website Reconnaissance (OBJ 2.3)_en.srt
22.9 kB
19 - Findings and Remediations (PT0-002)/010 Digital Certificates (OBJ 4.2)_en.srt
22.2 kB
05 - Active Reconnaissance (PT0-002)/007 Packet Crafting (OBJ 2.2)_en.srt
22.0 kB
10 - Network Attacks (PT0-002)/015 Using Netcat (OBJ 3.1)_en.srt
21.9 kB
15 - Attacks on Specialized Systems (PT0-002)/005 ICS and SCADA Devices (OBJ 3.5)_en.srt
21.6 kB
07 - Nmap (PT0-002)/005 Using Nmap (OBJ 2.3 and 2.4)_en.srt
21.5 kB
11 - Application Vulnerabilities (PT0-002)/010 Software Composition (OBJ 3.3)_en.srt
21.4 kB
05 - Active Reconnaissance (PT0-002)/006 Detecting and Evading Defenses (OBJ 2.2)_en.srt
21.2 kB
05 - Active Reconnaissance (PT0-002)/004 Other Enumeration (OBJ 2.2 and 2.3)_en.srt
21.2 kB
05 - Active Reconnaissance (PT0-002)/002 Scanning and Enumeration (OBJ 2.2 and 2.3)_en.srt
21.2 kB
21 - Scripting Basics (PT0-002)/002 Scripting Tools (OBJ 5.2)_en.srt
21.2 kB
19 - Findings and Remediations (PT0-002)/008 Secure Coding (OBJ 4.2)_en.srt
20.9 kB
02 - Planning an Engagement (PT0-002)/007 Planning a Test (OBJ 1.2)_en.srt
20.7 kB
06 - Vulnerability Scanning (PT0-002)/004 Scanning Considerations (OBJ 2.3 and 2.4)_en.srt
20.7 kB
10 - Network Attacks (PT0-002)/011 Password Attacks (OBJ 3.1)_en.srt
20.6 kB
14 - Attacks on Mobile Devices (PT0-002)/002 Enterprise Mobility Management (OBJ 3.5)_en.srt
20.6 kB
12 - Application Attacks (PT0-002)/008 Burp Suite and SQLmap (OBJ 3.3)_en.srt
20.5 kB
07 - Nmap (PT0-002)/003 Nmap Port Scans (OBJ 2.3 and 2.4)_en.srt
20.4 kB
03 - Scoping an Engagement (PT0-002)/007 Assessment Types (OBJ 1.3)_en.srt
20.3 kB
02 - Planning an Engagement (PT0-002)/002 Risk (OBJ 1.2)_en.srt
20.2 kB
17 - Detection Avoidance (PT0-002)/008 Covering Your Tracks (OBJ 3.7)_en.srt
20.1 kB
12 - Application Attacks (PT0-002)/004 Cross-Site Scripting (XSS) (OBJ 3.3)_en.srt
19.8 kB
22 - Analyzing Scripts (PT0-002)/011 JavaScript Example (OBJ 5.2)_en.srt
19.3 kB
06 - Vulnerability Scanning (PT0-002)/005 Nessus Scanning (OBJ 2.3 and 2.4)_en.srt
19.0 kB
12 - Application Attacks (PT0-002)/002 Directory Traversals (OBJ 3.3)_en.srt
18.8 kB
06 - Vulnerability Scanning (PT0-002)/002 Vulnerability Lifecycle (OBJ 2.3 and 2.4)_en.srt
18.8 kB
12 - Application Attacks (PT0-002)/007 Conducting SQL Injections (OBJ 3.3)_en.srt
18.5 kB
03 - Scoping an Engagement (PT0-002)/005 Identifying Restrictions (OBJ 1.1)_en.srt
18.2 kB
19 - Findings and Remediations (PT0-002)/012 Mitigation Strategies (OBJ 4.2)_en.srt
18.0 kB
24 - Tool Round-up (PT0-002)/013 Miscellaneous Tools (OBJ 5.3)_en.srt
18.0 kB
17 - Detection Avoidance (PT0-002)/009 Persistence and Covering Your Tracks (OBJ 3.7)_en.srt
18.0 kB
09 - Wireless Attacks (PT0-002)/005 WEP Hacking (OBJ 3.2)_en.srt
18.0 kB
16 - Post-exploitation (PT0-002)/007 Lateral Movement (OBJ 3.7)_en.srt
18.0 kB
14 - Attacks on Mobile Devices (PT0-002)/004 Mobile Reconnaissance Concerns (OBJ 3.5)_en.srt
17.9 kB
02 - Planning an Engagement (PT0-002)/008 Legal Concepts (OBJ 1.1)_en.srt
17.8 kB
05 - Active Reconnaissance (PT0-002)/009 Wardriving (OBJ 2.2)_en.srt
17.5 kB
03 - Scoping an Engagement (PT0-002)/006 Rules of Engagement (OBJ 1.2)_en.srt
17.4 kB
23 - Exploits and Automation (PT0-002)/003 Exploits for Remote Access (OBJ 5.2)_en.srt
17.4 kB
15 - Attacks on Specialized Systems (PT0-002)/008 Virtual Environments (OBJ 3.5)_en.srt
17.4 kB
09 - Wireless Attacks (PT0-002)/006 WPAWPA2 Hacking (OBJ 3.2)_en.srt
17.1 kB
16 - Post-exploitation (PT0-002)/005 Pass the Hash (OBJ 3.7)_en.srt
17.1 kB
13 - Cloud Attacks (PT0-002)/003 Credential Harvesting (OBJ 3.4)_en.srt
17.0 kB
08 - Social Engineering and Physical Attacks (PT0-002)/007 Baiting Victims (OBJ 3.6)_en.srt
16.9 kB
02 - Planning an Engagement (PT0-002)/003 Risk Handling (OBJ 1.2)_en.srt
16.6 kB
10 - Network Attacks (PT0-002)/012 Pass the Hash (OBJ 3.1)_en.srt
16.6 kB
15 - Attacks on Specialized Systems (PT0-002)/002 Internet of Things (IoT) Devices (OBJ 3.5)_en.srt
16.5 kB
15 - Attacks on Specialized Systems (PT0-002)/003 Internet of Things (IoT) Vulnerabilities (OBJ 3.5)_en.srt
16.5 kB
24 - Tool Round-up (PT0-002)/011 Steganography Tools (OBJ 5.3)_en.srt
16.5 kB
19 - Findings and Remediations (PT0-002)/004 Physical Controls (OBJ 4.2)_en.srt
16.4 kB
07 - Nmap (PT0-002)/002 Nmap Discovery Scans (OBJ 2.3 and 2.4)_en.srt
16.4 kB
12 - Application Attacks (PT0-002)/005 Cross-Site Request Forgery (CSRF) (OBJ 3.3)_en.srt
16.3 kB
02 - Planning an Engagement (PT0-002)/005 PenTest Methodologies (OBJ 1.2)_en.srt
16.2 kB
16 - Post-exploitation (PT0-002)/008 Pivoting (3.7)_en.srt
16.1 kB
04 - Passive Reconnaissance (PT0-002)/003 Open-Source Intelligence (OSINT) (OBJ 2.1)_en.srt
15.8 kB
15 - Attacks on Specialized Systems (PT0-002)/004 Embedded Systems (OBJ 3.5)_en.srt
15.8 kB
14 - Attacks on Mobile Devices (PT0-002)/010 Mobile Device Tools (OBJ 3.5)_en.srt
15.8 kB
10 - Network Attacks (PT0-002)/014 Netcat (OBJ 3.1)_en.srt
15.7 kB
02 - Planning an Engagement (PT0-002)/004 Controls (OBJ 1.2)_en.srt
15.4 kB
03 - Scoping an Engagement (PT0-002)/009 Limitations and Permission (OBJ 1.1 and 1.3)_en.srt
15.3 kB
12 - Application Attacks (PT0-002)/006 SQL Injections (OBJ 3.3)_en.srt
15.3 kB
12 - Application Attacks (PT0-002)/003 Dirbuster (OBJ 3.3)_en.srt
15.2 kB
19 - Findings and Remediations (PT0-002)/009 Implementing MFA (OBJ 4.2)_en.srt
15.1 kB
03 - Scoping an Engagement (PT0-002)/002 Defining the Scope (OBJ 1.2)_en.srt
15.0 kB
21 - Scripting Basics (PT0-002)/003 Variables (OBJ 5.1)_en.srt
15.0 kB
10 - Network Attacks (PT0-002)/004 ARP Poisoning (OBJ 3.1)_en.srt
14.9 kB
24 - Tool Round-up (PT0-002)/008 Credential Testing Tools (OBJ 5.3)_en.srt
14.9 kB
24 - Tool Round-up (PT0-002)/005 Wireless Tools (OBJ 5.3)_en.srt
14.7 kB
17 - Detection Avoidance (PT0-002)/007 Steganography (3.7)_en.srt
14.4 kB
17 - Detection Avoidance (PT0-002)/005 Data Exfiltration (OBJ 3.7)_en.srt
14.4 kB
10 - Network Attacks (PT0-002)/008 VLAN Hopping (OBJ 3.1)_en.srt
14.3 kB
02 - Planning an Engagement (PT0-002)/006 PenTest Standards (OBJ 1.2)_en.srt
14.2 kB
18 - Communication and Reports (PT0-002)/005 Presentation of Findings (4.1 & OBJ 4.3)_en.srt
14.1 kB
21 - Scripting Basics (PT0-002)/007 Object Oriented Programming (OBJ 5.1)_en.srt
14.0 kB
11 - Application Vulnerabilities (PT0-002)/011 Privilege Escalation (OBJ 3.3)_en.srt
14.0 kB
13 - Cloud Attacks (PT0-002)/002 Attacking the Cloud (OBJ 3.4)_en.srt
13.8 kB
15 - Attacks on Specialized Systems (PT0-002)/009 Virtual Machine Attacks (OBJ 3.5)_en.srt
13.7 kB
10 - Network Attacks (PT0-002)/002 Stress Testing (OBJ 3.1)_en.srt
13.4 kB
09 - Wireless Attacks (PT0-002)/008 Evil Twins (OBJ 3.2)_en.srt
13.4 kB
12 - Application Attacks (PT0-002)/010 XML Injections (OBJ 3.3)_en.srt
13.3 kB
11 - Application Vulnerabilities (PT0-002)/007 Improper Headers (OBJ 3.3)_en.srt
13.2 kB
04 - Passive Reconnaissance (PT0-002)/010 Search Engine Analysis (OBJ 2.1)_en.srt
13.1 kB
18 - Communication and Reports (PT0-002)/002 Communication Paths (OBJ 4.3)_en.srt
12.9 kB
04 - Passive Reconnaissance (PT0-002)/002 Information Gathering (OBJ 2.1)_en.srt
12.9 kB
15 - Attacks on Specialized Systems (PT0-002)/010 Containerization (OBJ 3.5)_en.srt
12.9 kB
10 - Network Attacks (PT0-002)/003 Exploit Resources (OBJ 3.1)_en.srt
12.6 kB
15 - Attacks on Specialized Systems (PT0-002)/007 Data Storage Vulnerabilities (OBJ 3.5)_en.srt
12.5 kB
11 - Application Vulnerabilities (PT0-002)/001 Application Vulnerabilities (OBJ 3.3)_en.srt
12.3 kB
09 - Wireless Attacks (PT0-002)/010 Bluetooth Attacks (OBJ 3.2)_en.srt
12.2 kB
11 - Application Vulnerabilities (PT0-002)/005 Authentication and References (OBJ 3.3)_en.srt
12.2 kB
24 - Tool Round-up (PT0-002)/003 Scanning Tools (OBJ 5.3)_en.srt
12.2 kB
16 - Post-exploitation (PT0-002)/006 Golden Ticket (OBJ 3.7)_en.srt
12.2 kB
04 - Passive Reconnaissance (PT0-002)/013 CWE & CVE (OBJ 2.1)_en.srt
12.1 kB
24 - Tool Round-up (PT0-002)/002 OSINT Tools (OBJ 5.3)_en.srt
12.1 kB
11 - Application Vulnerabilities (PT0-002)/006 Improper Error Handling (OBJ 3.3)_en.srt
12.1 kB
23 - Exploits and Automation (PT0-002)/004 Exploits for Enumerating Users (OBJ 5.2)_en.srt
11.7 kB
04 - Passive Reconnaissance (PT0-002)/009 Public Repositories (OBJ2.1)_en.srt
11.7 kB
11 - Application Vulnerabilities (PT0-002)/004 Buffer Overflow Attacks (OBJ 3.3)_en.srt
11.6 kB
13 - Cloud Attacks (PT0-002)/005 Metadata Service Attack (OBJ 3.4)_en.srt
11.6 kB
11 - Application Vulnerabilities (PT0-002)/002 Race Conditions (OBJ 3.3)_en.srt
11.4 kB
08 - Social Engineering and Physical Attacks (PT0-002)/004 Phishing Campaigns (OBJ 3.6)_en.srt
11.3 kB
16 - Post-exploitation (PT0-002)/010 Upgrading Restrictive Shells (OBJ 3.7)_en.srt
11.2 kB
03 - Scoping an Engagement (PT0-002)/008 Validating the Scope (OBJ 1.2)_en.srt
11.2 kB
10 - Network Attacks (PT0-002)/007 MAC Spoofing (OBJ 3.1)_en.srt
10.9 kB
22 - Analyzing Scripts (PT0-002)/001 Analyzing Scripts (OBJ 5.2)_en.srt
10.9 kB
06 - Vulnerability Scanning (PT0-002)/007 Nikto Scanning (OBJ 2.3 and 2.4)_en.srt
10.7 kB
18 - Communication and Reports (PT0-002)/009 Securing and Storing Reports (OBJ 4.1)_en.srt
10.6 kB
17 - Detection Avoidance (PT0-002)/006 Covert Channels (OBJ 3.7)_en.srt
10.6 kB
14 - Attacks on Mobile Devices (PT0-002)/007 Mobile Device Attacks (OBJ 3.5)_en.srt
10.6 kB
19 - Findings and Remediations (PT0-002)/003 Selecting Security Controls (OBJ 4.2)_en.srt
10.5 kB
14 - Attacks on Mobile Devices (PT0-002)/001 Attacks on Mobile Devices (OBJ 3.5)_en.srt
10.5 kB
21 - Scripting Basics (PT0-002)/004 Loops (OBJ 5.1)_en.srt
10.3 kB
18 - Communication and Reports (PT0-002)/003 Communication Triggers (OBJ 4.3)_en.srt
10.2 kB
10 - Network Attacks (PT0-002)/009 NAC Bypass (OBJ 3.1)_en.srt
10.2 kB
24 - Tool Round-up (PT0-002)/012 Debuggers (OBJ 5.3)_en.srt
10.2 kB
08 - Social Engineering and Physical Attacks (PT0-002)/006 Pretexting (OBJ 3.6)_en.srt
10.0 kB
08 - Social Engineering and Physical Attacks (PT0-002)/008 Impersonation (OBJ 3.6)_en.srt
10.0 kB
07 - Nmap (PT0-002)/004 Nmap Fingerprinting (OBJ 2.3 and 2.4)_en.srt
10.0 kB
09 - Wireless Attacks (PT0-002)/011 RFID and NFC Attacks (OBJ 3.2)_en.srt
10.0 kB
09 - Wireless Attacks (PT0-002)/009 On-path and Relay Attacks (OBJ 3.2)_en.srt
10.0 kB
14 - Attacks on Mobile Devices (PT0-002)/003 Deployment Options (OBJ 3.5)_en.srt
9.8 kB
13 - Cloud Attacks (PT0-002)/007 Auditing the Cloud (OBJ 3.4)_en.srt
9.7 kB
17 - Detection Avoidance (PT0-002)/002 Trojans and Backdoors (OBJ 3.7)_en.srt
9.6 kB
23 - Exploits and Automation (PT0-002)/005 Exploits for Enumerating Assets (OBJ 5.2)_en.srt
9.6 kB
12 - Application Attacks (PT0-002)/011 Other Injection Attacks (OBJ 3.3)_en.srt
8.9 kB
25 - Conclusion (PT0-002)/002 BONUS Where to go from here_en.srt
8.9 kB
08 - Social Engineering and Physical Attacks (PT0-002)/012 Social Engineering Tools (OBJ 3.6)_en.srt
8.9 kB
22 - Analyzing Scripts (PT0-002)/003 Bash Example (OBJ 5.2)_en.srt
8.9 kB
20 - Post-report Activities (PT0-002)/007 Lessons Learned (OBJ 4.2)_en.srt
8.9 kB
01 - Welcome to the Course (PT0-002)/003 Exam Tips_en.srt
8.9 kB
16 - Post-exploitation (PT0-002)/002 Enumerating the Network (OBJ 3.7)_en.srt
8.8 kB
10 - Network Attacks (PT0-002)/006 LLMNRNBT-NS Poisoning (OBJ 3.1)_en.srt
8.7 kB
21 - Scripting Basics (PT0-002)/005 Logic Control (OBJ 5.1)_en.srt
8.7 kB
23 - Exploits and Automation (PT0-002)/002 Exploits to Download Files (OBJ 5.2)_en.srt
8.6 kB
22 - Analyzing Scripts (PT0-002)/013 Ruby Example (OBJ 5.2)_en.srt
8.4 kB
24 - Tool Round-up (PT0-002)/007 Remote Access Tools (OBJ 5.3)_en.srt
8.3 kB
22 - Analyzing Scripts (PT0-002)/007 Python Example (OBJ 5.2)_en.srt
8.1 kB
03 - Scoping an Engagement (PT0-002)/001 Scoping an Engagement (OBJ 1.1, 1.2, and 1.3)_en.srt
8.0 kB
10 - Network Attacks (PT0-002)/010 On-path Attack (OBJ 3.1)_en.srt
8.0 kB
18 - Communication and Reports (PT0-002)/006 Report Data Gathering (OBJ 4.1)_en.srt
7.8 kB
08 - Social Engineering and Physical Attacks (PT0-002)/001 Social Engineering and Physical Attacks (OBJ 3.6)_en.srt
7.8 kB
09 - Wireless Attacks (PT0-002)/001 Wireless Attacks (OBJ 3.2)_en.srt
7.6 kB
09 - Wireless Attacks (PT0-002)/003 Bypassing MAC Filtering (OBJ 3.2)_en.srt
7.5 kB
23 - Exploits and Automation (PT0-002)/006 Automation in Engagements (OBJ 5.2)_en.srt
7.2 kB
16 - Post-exploitation (PT0-002)/004 Lateral Movement and Pivoting (OBJ 3.7)_en.srt
7.0 kB
24 - Tool Round-up (PT0-002)/001 Tool Round-up (OBJ 5.3)_en.srt
6.7 kB
22 - Analyzing Scripts (PT0-002)/005 PowerShell Example (OBJ 5.2)_en.srt
6.6 kB
20 - Post-report Activities (PT0-002)/006 Attestation of Findings (OBJ 4.2)_en.srt
6.4 kB
20 - Post-report Activities (PT0-002)/005 Client Acceptance (OBJ 4.2)_en.srt
6.4 kB
18 - Communication and Reports (PT0-002)/008 Common Themes (OBJ 4.1)_en.srt
6.3 kB
16 - Post-exploitation (PT0-002)/001 Post-exploitation (OBJ 3.7)_en.srt
6.3 kB
12 - Application Attacks (PT0-002)/009 OWASP ZAP (OBJ 3.3)_en.srt
6.2 kB
04 - Passive Reconnaissance (PT0-002)/001 Passive Reconnaissance (OBJ 2.1)_en.srt
6.1 kB
16 - Post-exploitation (PT0-002)/003 Network Segmentation Testing (OBJ 3.7)_en.srt
6.1 kB
12 - Application Attacks (PT0-002)/001 Application Attacks (OBJ 3.3)_en.srt
6.1 kB
20 - Post-report Activities (PT0-002)/002 Removing Shells and Tools (OBJ 4.2)_en.srt
6.1 kB
20 - Post-report Activities (PT0-002)/001 Post-report Activities (OBJ 4.2)_en.srt
6.0 kB
15 - Attacks on Specialized Systems (PT0-002)/001 Attacks on Specialized Systems (OBJ 3.5)_en.srt
5.9 kB
24 - Tool Round-up (PT0-002)/010 Cloud Tools (OBJ 5.3)_en.srt
5.9 kB
17 - Detection Avoidance (PT0-002)/010 Post-Exploitation Tools (OBJ 3.7)_en.srt
5.8 kB
20 - Post-report Activities (PT0-002)/004 Destroy Test Data (OBJ 4.2)_en.srt
5.8 kB
13 - Cloud Attacks (PT0-002)/006 Software Development Kit (SDK) (OBJ 3.4)_en.srt
5.7 kB
02 - Planning an Engagement (PT0-002)/001 Planning an Engagement (OBJ 1.1, 1.2, and 1.3)_en.srt
5.6 kB
07 - Nmap (PT0-002)/001 Nmap (OBJ 2.3 and 2.4)_en.srt
5.6 kB
20 - Post-report Activities (PT0-002)/008 Retesting (OBJ 4.2)_en.srt
5.6 kB
19 - Findings and Remediations (PT0-002)/011 Other Technical Controls (OBJ 4.2)_en.srt
5.5 kB
19 - Findings and Remediations (PT0-002)/001 Findings and Remediations (OBJ 4.2)_en.srt
5.5 kB
10 - Network Attacks (PT0-002)/001 Network Attacks (OBJ 3.1)_en.srt
5.4 kB
24 - Tool Round-up (PT0-002)/006 Social Engineering Tools (OBJ 5.3)_en.srt
5.3 kB
23 - Exploits and Automation (PT0-002)/007 Automation with Nmap Scripts (OBJ 5.2)_en.srt
5.2 kB
24 - Tool Round-up (PT0-002)/004 Networking Tools (OBJ 5.3)_en.srt
5.0 kB
21 - Scripting Basics (PT0-002)/001 Scripting Basics (OBJ 5.1 & OBJ 5.2)_en.srt
4.9 kB
05 - Active Reconnaissance (PT0-002)/001 Active Reconnaissance (OBJ 2.2 and 2.3)_en.srt
4.8 kB
20 - Post-report Activities (PT0-002)/003 Deleting Test Credentials (OBJ 4.2)_en.srt
4.6 kB
24 - Tool Round-up (PT0-002)/009 Web Application Tools (OBJ 5.3)_en.srt
4.5 kB
13 - Cloud Attacks (PT0-002)/001 Cloud Attacks (OBJ 3.4)_en.srt
4.4 kB
18 - Communication and Reports (PT0-002)/001 Communication and Reports (OBJ 4.3)_en.srt
4.4 kB
11 - Application Vulnerabilities (PT0-002)/008 Code Signing (OBJ 3.3)_en.srt
4.4 kB
06 - Vulnerability Scanning (PT0-002)/001 Vulnerability Scanning (OBJ 2.3 and 2.4)_en.srt
4.3 kB
23 - Exploits and Automation (PT0-002)/001 Exploits and Automation (OBJ 5.2)_en.srt
4.0 kB
08 - Social Engineering and Physical Attacks (PT0-002)/010 Lock Picking (OBJ 3.6)_en.srt
3.3 kB
17 - Detection Avoidance (PT0-002)/001 Detection Avoidance (OBJ 3.7)_en.srt
3.1 kB
01 - Welcome to the Course (PT0-002)/002 Download Your Free Study Guide.html
75 Bytes
随机展示
相关说明
本站不存储任何资源内容,只收集BT种子元数据(例如文件名和文件大小)和磁力链接(BT种子标识符),并提供查询服务,是一个完全合法的搜索引擎系统。 网站不提供种子下载服务,用户可以通过第三方链接或磁力链接获取到相关的种子资源。本站也不对BT种子真实性及合法性负责,请用户注意甄别!
>