Practical Windows Penetration Testing [Video]
File List
- 4.Post-Exploitation/20.Achieving Persistence.mp4 145.8 MB
- 3.Exploitation Techniques/13.Evading Anti-Virus.mp4 111.9 MB
- 1.Environment Setup/05.Setting Up Target Win 10.mp4 94.0 MB
- 5.Propagation Attacks/22.Pass-the-Hash Attack.mp4 93.1 MB
- 2.Recon/08.Scanning.mp4 83.3 MB
- 3.Exploitation Techniques/10.Using Public Exploits.mp4 78.0 MB
- 2.Recon/09.Service Identification.mp4 77.2 MB
- 3.Exploitation Techniques/12.Social Engineering.mp4 54.6 MB
- 1.Environment Setup/07.Creating the Domain.mp4 52.7 MB
- 5.Propagation Attacks/21.Pivoting.mp4 51.7 MB
- 4.Post-Exploitation/16.Meterpreter.mp4 50.4 MB
- 4.Post-Exploitation/17.Privilege Escalation.mp4 47.1 MB
- 4.Post-Exploitation/18.Collecting Credentials.mp4 38.3 MB
- 3.Exploitation Techniques/11.Exploiting with Metasploit.mp4 37.4 MB
- 4.Post-Exploitation/19.Password Brute-Force.mp4 33.2 MB
- 1.Environment Setup/06.Setting Up Target Win 2016.mp4 26.3 MB
- 1.Environment Setup/04.Setting Up Kali.mp4 15.9 MB
- 3.Exploitation Techniques/14.Final Word on Exploitation.mp4 15.4 MB
- 1.Environment Setup/02.Disclaimer.mp4 13.5 MB
- 4.Post-Exploitation/15.About Post-Exploitation.mp4 12.7 MB
- 1.Environment Setup/01.The Course Overview.mp4 8.9 MB
- 5.Propagation Attacks/23.Review And Next Steps.mp4 6.9 MB
- 1.Environment Setup/03.Test Lab Architecture.mp4 4.5 MB
Download Torrent
Related Resources
Copyright Infringement
If the content above is not authorized, please contact us via activebusinesscommunication[AT]gmail.com. Remember to include the full url in your complaint.