Troy Hunt - Social Engineering.2024.ENGLISH.720p.WEB.x264-[Pirate_Anonyme]
File List
- 3. Reconnaisance and OSINT/2. Understanding OSINT.mp4 53.6 MB
- 2. A walkthrough of a social engineering attack/7. Monetizing the scam.mp4 53.3 MB
- 6. Social Engineering Countermeasures/3. Record destruction.mp4 52.6 MB
- 2. A walkthrough of a social engineering attack/5. Demonstrating authenticity.mp4 48.8 MB
- 2. A walkthrough of a social engineering attack/6. Creating a debt.mp4 45.0 MB
- 4. Phishing attacks/9. Phishing with beef.mp4 43.1 MB
- 1. Humans; The soft center withing the hard shell/2. SE Through the ages.mp4 35.2 MB
- 1. Humans; The soft center withing the hard shell/4. Human weaknesses that enable SE.mp4 33.2 MB
- 5. Identity theft and impersonation/6. Impersonation.mp4 31.9 MB
- 3. Reconnaisance and OSINT/6. Shoulder surfing, eavesdropping and tailgating.mp4 31.5 MB
- 2. A walkthrough of a social engineering attack/4. Executing the SE attack.mp4 31.1 MB
- 4. Phishing attacks/7. Filter evasion and concealment techniques.mp4 30.5 MB
- 4. Phishing attacks/2. Phishing.mp4 29.9 MB
- 4. Phishing attacks/10. Phish5.mp4 29.8 MB
- 6. Social Engineering Countermeasures/6. Multistep and side channel identity verification.mp4 29.6 MB
- 6. Social Engineering Countermeasures/4. Physical security.mp4 29.5 MB
- 5. Identity theft and impersonation/7. Social Engineering and impersonation by example.mp4 28.1 MB
- 3. Reconnaisance and OSINT/4. Identifying targets within an organization.mp4 27.8 MB
- 5. Identity theft and impersonation/4. The mechanics of an identity theft attack.mp4 27.4 MB
- 5. Identity theft and impersonation/3. Identities for sale.mp4 26.4 MB
- 4. Phishing attacks/3. Call signs of a fishing email.mp4 24.9 MB
- 1. Humans; The soft center withing the hard shell/6. SE at home and popular culture.mp4 23.3 MB
- 6. Social Engineering Countermeasures/5. Separation of duties and Principle of least privilege.mp4 21.3 MB
- 2. A walkthrough of a social engineering attack/2. Case Study; Cold call virus scams.mp4 20.6 MB
- 4. Phishing attacks/4. Call signs of a fishing page.mp4 19.1 MB
- 6. Social Engineering Countermeasures/2. Defenses in the browser and mail clients.mp4 16.9 MB
- 1. Humans; The soft center withing the hard shell/3. The soft center that SE exploits.mp4 15.9 MB
- 5. Identity theft and impersonation/5. In-person Human-based identity theft.mp4 15.6 MB
- 2. A walkthrough of a social engineering attack/3. Establishing authority and creating fear.mp4 15.3 MB
- 6. Social Engineering Countermeasures/9. Conditioning the humans.mp4 11.9 MB
- 3. Reconnaisance and OSINT/7. Dumpster diving and mail theft.mp4 11.5 MB
- 3. Reconnaisance and OSINT/3. Organizational Recon.mp4 11.3 MB
- 4. Phishing attacks/8. Identifying attacks with phishtank.mp4 10.6 MB
- 6. Social Engineering Countermeasures/7. Logging, auditing and monitoring.mp4 10.5 MB
- 4. Phishing attacks/6. Enumeration as a verification vector.mp4 10.4 MB
- 4. Phishing attacks/5. Understanding spearphishing.mp4 9.3 MB
- 3. Reconnaisance and OSINT/8. Data breaches.mp4 8.9 MB
- 3. Reconnaisance and OSINT/5. Identity recon with PiPL.mp4 8.8 MB
- 6. Social Engineering Countermeasures/8. Identity monitoring.mp4 8.1 MB
- 5. Identity theft and impersonation/2. The impact of identity theft.mp4 8.0 MB
- 5. Identity theft and impersonation/1. Introduction.mp4 7.2 MB
- 2. A walkthrough of a social engineering attack/8. Summary.mp4 7.0 MB
- 1. Humans; The soft center withing the hard shell/5. Computer based vs Human based SE.mp4 6.9 MB
- 4. Phishing attacks/1. Introduction.mp4 6.8 MB
- 1. Humans; The soft center withing the hard shell/1. Introduction.mp4 6.7 MB
- 6. Social Engineering Countermeasures/10. Summary.mp4 6.2 MB
- 3. Reconnaisance and OSINT/1. Introduction.mp4 6.1 MB
- 5. Identity theft and impersonation/8. Summary.mp4 5.6 MB
- 6. Social Engineering Countermeasures/1. Introduction.mp4 4.8 MB
- 4. Phishing attacks/11. Summary.mp4 4.6 MB
- 1. Humans; The soft center withing the hard shell/7. Summary.mp4 3.9 MB
- 3. Reconnaisance and OSINT/9. Summary.mp4 3.9 MB
- 2. A walkthrough of a social engineering attack/1. Introduction (2).mp4 3.9 MB
- Docs.pdf 275.7 KB
Download Torrent
Related Resources
Copyright Infringement
If the content above is not authorized, please contact us via activebusinesscommunication[AT]gmail.com. Remember to include the full url in your complaint.