PEN-200 - Penetration Testing with Kali Linux Videos/12. LINUX PRIVILEGE ESCALATION/12.1. Enumerating Linux/12.1.1. Manual Enumeration.mp4 78.9 MB
PEN-200 - Penetration Testing with Kali Linux Videos/11. WINDOWS PRIVILEGE ESCALATION/11.2. Leveraging Windows Services/11.2.2. Service DLL Hijacking.mp4 69.7 MB
PEN-200 - Penetration Testing with Kali Linux Videos/11. WINDOWS PRIVILEGE ESCALATION/11.2. Leveraging Windows Services/11.2.1. Service Binary Hijacking.mp4 65.8 MB
PEN-200 - Penetration Testing with Kali Linux Videos/11. WINDOWS PRIVILEGE ESCALATION/11.1. Enumerating Windows/11.1.1. Situational Awareness.mp4 65.0 MB
PEN-200 - Penetration Testing with Kali Linux Videos/07. ANTIVIRUS EVASION/7.2. AV Evasion in Practice/7.2.1. Evading AV with Thread Injection.mp4 56.5 MB
PEN-200 - Penetration Testing with Kali Linux Videos/16. ACTIVE DIRECTORY INTRODUCTION AND ENUMERATION/16.1. Active Directory - Manual Enumeration/16.1.3. Adding Search Functionality to our Script.mp4 55.4 MB
PEN-200 - Penetration Testing with Kali Linux Videos/15. THE METASPLOIT FRAMEWORK/15.2. Using Metasploit Payloads/15.2.2. Meterpreter Payload.mp4 49.3 MB
PEN-200 - Penetration Testing with Kali Linux Videos/11. WINDOWS PRIVILEGE ESCALATION/11.2. Leveraging Windows Services/11.2.3. Unquoted Service Paths.mp4 48.8 MB
PEN-200 - Penetration Testing with Kali Linux Videos/16. ACTIVE DIRECTORY INTRODUCTION AND ENUMERATION/16.3. Active Directory - Automated Enumeration/16.3.2. Analysing Data using BloodHound.mp4 46.8 MB
PEN-200 - Penetration Testing with Kali Linux Videos/13. PORT REDIRECTION AND SSH TUNNELING/13.2. SSH Tunneling/13.2.1. SSH Local Port Forwarding.mp4 46.5 MB
PEN-200 - Penetration Testing with Kali Linux Videos/06. CLIENT-SIDE ATTACKS/6.3. Abusing Windows Library Files/6.3.1. Obtaining Code Execution via Windows Library Files.mp4 45.4 MB
PEN-200 - Penetration Testing with Kali Linux Videos/04. COMMON WEB APPLICATION ATTACKS/4.2. File Inclusion Vulnerabilities/4.2.1. Local File Inclusion (LFI).mp4 45.0 MB
PEN-200 - Penetration Testing with Kali Linux Videos/14. TUNNELING THROUGH DEEP PACKET INSPECTION/14.2. DNS Tunneling Theory and Practice/14.2.1. DNS Tunneling Fundamentals.mp4 44.0 MB
PEN-200 - Penetration Testing with Kali Linux Videos/01. INFORMATION GATHERING/1.2. Active Information Gathering/1.2.2. Port Scanning with Nmap.mp4 41.5 MB
PEN-200 - Penetration Testing with Kali Linux Videos/15. THE METASPLOIT FRAMEWORK/15.3. Performing Post-Exploitation with Metasploit/15.3.1. Core Meterpreter Post-Exploitation Features.mp4 39.9 MB
PEN-200 - Penetration Testing with Kali Linux Videos/06. CLIENT-SIDE ATTACKS/6.2. Exploiting Microsoft Office/6.2.1. Leveraging Microsoft Word Macros.mp4 38.8 MB
PEN-200 - Penetration Testing with Kali Linux Videos/04. COMMON WEB APPLICATION ATTACKS/4.1. Directory Traversal/4.1.2. Identifying and Exploiting Directory Traversals.mp4 38.3 MB
PEN200.pdf 37.9 MB
PEN-200 - Penetration Testing with Kali Linux Videos/11. WINDOWS PRIVILEGE ESCALATION/11.1. Enumerating Windows/11.1.3. Information Goldmine PowerShell.mp4 37.3 MB
PEN-200 - Penetration Testing with Kali Linux Videos/15. THE METASPLOIT FRAMEWORK/15.3. Performing Post-Exploitation with Metasploit/15.3.3. Pivoting with Metasploit.mp4 37.2 MB
PEN-200 - Penetration Testing with Kali Linux Videos/03. INTRODUCTION TO WEB APPLICATION ATTACKS/3.1. Web Application Assessment Tools/3.1.3. Security Testing with Burp Suite.mp4 34.8 MB
PEN-200 - Penetration Testing with Kali Linux Videos/10. LOCATING PUBLIC EXPLOITS/10.2. Exploiting a Target/10.2.1. Putting It Together.mp4 34.5 MB
PEN-200 - Penetration Testing with Kali Linux Videos/13. PORT REDIRECTION AND SSH TUNNELING/13.1. Port Forwarding with Linux Tools/13.1.2. Setting Up the Lab Environment.mp4 34.4 MB
PEN-200 - Penetration Testing with Kali Linux Videos/03. INTRODUCTION TO WEB APPLICATION ATTACKS/3.3. Cross-Site Scripting/3.3.2. Privilege Escalation via XSS.mp4 34.2 MB
PEN-200 - Penetration Testing with Kali Linux Videos/16. ACTIVE DIRECTORY INTRODUCTION AND ENUMERATION/16.2. Manual Enumeration - Expanding our Repertoire/16.2.2. Getting an Overview - Permissions and Logged on Users.mp4 34.1 MB
PEN-200 - Penetration Testing with Kali Linux Videos/11. WINDOWS PRIVILEGE ESCALATION/11.1. Enumerating Windows/11.1.2. Hidden in Plain View.mp4 33.8 MB
PEN-200 - Penetration Testing with Kali Linux Videos/08. PASSWORD ATTACKS/8.2. Password Cracking Fundamentals/8.2.4. SSH Private Key Passphrase.mp4 33.5 MB
PEN-200 - Penetration Testing with Kali Linux Videos/09. FIXING EXPLOITS/9.1. Fixing Memory Corruption Exploits/9.1.3. Fixing the Exploit.mp4 33.3 MB
PEN-200 - Penetration Testing with Kali Linux Videos/15. THE METASPLOIT FRAMEWORK/15.3. Performing Post-Exploitation with Metasploit/15.3.2. Post-Exploitation Modules.mp4 33.0 MB
PEN-200 - Penetration Testing with Kali Linux Videos/08. PASSWORD ATTACKS/8.2. Password Cracking Fundamentals/8.2.2. Mutating Wordlists.mp4 32.2 MB
PEN-200 - Penetration Testing with Kali Linux Videos/15. THE METASPLOIT FRAMEWORK/15.1. Getting Familiar with Metasploit/15.1.3. Exploit Modules.mp4 32.1 MB
PEN-200 - Penetration Testing with Kali Linux Videos/01. INFORMATION GATHERING/1.2. Active Information Gathering/1.2.1. DNS Enumeration.mp4 31.4 MB
PEN-200 - Penetration Testing with Kali Linux Videos/17. ATTACKING ACTIVE DIRECTORY AUTHENTICATION/17.2. Performing Attacks on Active Directory Authentication/17.2.1. Password Attacks.mp4 30.3 MB
PEN-200 - Penetration Testing with Kali Linux Videos/04. COMMON WEB APPLICATION ATTACKS/4.3. File Upload Vulnerabilities/4.3.2. Using Non-Executable Files.mp4 29.9 MB
PEN-200 - Penetration Testing with Kali Linux Videos/04. COMMON WEB APPLICATION ATTACKS/4.3. File Upload Vulnerabilities/4.3.1. Using Executable Files.mp4 29.9 MB
PEN-200 - Penetration Testing with Kali Linux Videos/13. PORT REDIRECTION AND SSH TUNNELING/13.1. Port Forwarding with Linux Tools/13.1.3. Port Forwarding with Socat.mp4 29.6 MB
PEN-200 - Penetration Testing with Kali Linux Videos/18. LATERAL MOVEMENT IN ACTIVE DIRECTORY/18.1. Active Directory Lateral Movement Techniques/18.1.1. WMI and WinRM.mp4 29.1 MB
PEN-200 - Penetration Testing with Kali Linux Videos/08. PASSWORD ATTACKS/8.2. Password Cracking Fundamentals/8.2.3. Password Manager.mp4 29.0 MB
PEN-200 - Penetration Testing with Kali Linux Videos/15. THE METASPLOIT FRAMEWORK/15.1. Getting Familiar with Metasploit/15.1.2. Auxiliary Modules.mp4 28.6 MB
PEN-200 - Penetration Testing with Kali Linux Videos/08. PASSWORD ATTACKS/8.3. Working with Password Hashes/8.3.2. Passing NTLM.mp4 28.5 MB
PEN-200 - Penetration Testing with Kali Linux Videos/03. INTRODUCTION TO WEB APPLICATION ATTACKS/3.2. Web Application Enumeration/3.2.3. Enumerating and Abusing APIs.mp4 28.3 MB
PEN-200 - Penetration Testing with Kali Linux Videos/07. ANTIVIRUS EVASION/7.2. AV Evasion in Practice/7.2.2. Automating the Process.mp4 27.3 MB
PEN-200 - Penetration Testing with Kali Linux Videos/08. PASSWORD ATTACKS/8.3. Working with Password Hashes/8.3.1. Cracking NTLM.mp4 26.8 MB
PEN-200 - Penetration Testing with Kali Linux Videos/13. PORT REDIRECTION AND SSH TUNNELING/13.2. SSH Tunneling/13.2.2. SSH Dynamic Port Forwarding.mp4 26.3 MB
PEN-200 - Penetration Testing with Kali Linux Videos/14. TUNNELING THROUGH DEEP PACKET INSPECTION/14.2. DNS Tunneling Theory and Practice/14.2.2. DNS Tunneling with dnscat2.mp4 25.1 MB
PEN-200 - Penetration Testing with Kali Linux Videos/17. ATTACKING ACTIVE DIRECTORY AUTHENTICATION/17.2. Performing Attacks on Active Directory Authentication/17.2.3. Kerberoasting.mp4 24.9 MB
PEN-200 - Penetration Testing with Kali Linux Videos/15. THE METASPLOIT FRAMEWORK/15.2. Using Metasploit Payloads/15.2.3. Executable Payloads.mp4 24.8 MB
PEN-200 - Penetration Testing with Kali Linux Videos/11. WINDOWS PRIVILEGE ESCALATION/11.1. Enumerating Windows/11.1.4. Automated Enumeration.mp4 24.8 MB
PEN-200 - Penetration Testing with Kali Linux Videos/05. SQL INJECTION ATTACKS/5.3. Manual and Automated Code Execution/5.3.2. Automating the Attack.mp4 24.6 MB
PEN-200 - Penetration Testing with Kali Linux Videos/14. TUNNELING THROUGH DEEP PACKET INSPECTION/14.1. HTTP Tunneling Theory and Practice/14.1.2. HTTP Tunneling with Chisel.mp4 24.3 MB
PEN-200 - Penetration Testing with Kali Linux Videos/13. PORT REDIRECTION AND SSH TUNNELING/13.3. Port Forwarding with Windows Tools/13.3.3. Netsh.mp4 24.1 MB
PEN-200 - Penetration Testing with Kali Linux Videos/04. COMMON WEB APPLICATION ATTACKS/4.4. Command Injection/4.4.1. OS Command Injection.mp4 23.6 MB
PEN-200 - Penetration Testing with Kali Linux Videos/17. ATTACKING ACTIVE DIRECTORY AUTHENTICATION/17.2. Performing Attacks on Active Directory Authentication/17.2.4. Silver Tickets.mp4 23.6 MB
PEN-200 - Penetration Testing with Kali Linux Videos/02. VULNERABILITY SCANNING/2.1. Vulnerability Scanning with Nessus/2.1.5. Working with Nessus Plugins.mp4 22.4 MB
PEN-200 - Penetration Testing with Kali Linux Videos/11. WINDOWS PRIVILEGE ESCALATION/11.3. Abusing Other Windows Components/11.3.2. Using Exploits.mp4 22.3 MB
PEN-200 - Penetration Testing with Kali Linux Videos/02. VULNERABILITY SCANNING/2.1. Vulnerability Scanning with Nessus/2.1.3. Analyzing the Results.mp4 22.3 MB
PEN-200 - Penetration Testing with Kali Linux Videos/18. LATERAL MOVEMENT IN ACTIVE DIRECTORY/18.1. Active Directory Lateral Movement Techniques/18.1.4. Overpass the Hash.mp4 22.0 MB
PEN-200 - Penetration Testing with Kali Linux Videos/08. PASSWORD ATTACKS/8.3. Working with Password Hashes/8.3.3. Cracking Net-NTLMv2.mp4 21.7 MB
PEN-200 - Penetration Testing with Kali Linux Videos/11. WINDOWS PRIVILEGE ESCALATION/11.3. Abusing Other Windows Components/11.3.1. Scheduled Tasks.mp4 21.1 MB
PEN-200 - Penetration Testing with Kali Linux Videos/12. LINUX PRIVILEGE ESCALATION/12.4. Insecure System Components/12.4.1. Abusing Setuid Binaries and Capabilities.mp4 21.0 MB
PEN-200 - Penetration Testing with Kali Linux Videos/08. PASSWORD ATTACKS/8.2. Password Cracking Fundamentals/8.2.1. Introduction to Encryption, Hashes and Cracking.mp4 20.9 MB
PEN-200 - Penetration Testing with Kali Linux Videos/08. PASSWORD ATTACKS/8.1. Attacking Network Services Logins/8.1.2. HTTP POST Login Form.mp4 20.9 MB
PEN-200 - Penetration Testing with Kali Linux Videos/18. LATERAL MOVEMENT IN ACTIVE DIRECTORY/18.1. Active Directory Lateral Movement Techniques/18.1.5. Pass the Ticket.mp4 20.8 MB
PEN-200 - Penetration Testing with Kali Linux Videos/16. ACTIVE DIRECTORY INTRODUCTION AND ENUMERATION/16.1. Active Directory - Manual Enumeration/16.1.2. Enumerating Active Directory using PowerShell and .NET Classes.mp4 20.8 MB
PEN-200 - Penetration Testing with Kali Linux Videos/02. VULNERABILITY SCANNING/2.1. Vulnerability Scanning with Nessus/2.1.4. Performing an Authenticated Vulnerability Scan.mp4 20.4 MB
PEN-200 - Penetration Testing with Kali Linux Videos/02. VULNERABILITY SCANNING/2.2. Vulnerability Scanning with Nmap/2.2.1. NSE Vulnerability Scripts.mp4 20.0 MB
PEN-200 - Penetration Testing with Kali Linux Videos/13. PORT REDIRECTION AND SSH TUNNELING/13.3. Port Forwarding with Windows Tools/13.3.2. Plink.mp4 19.9 MB
PEN-200 - Penetration Testing with Kali Linux Videos/16. ACTIVE DIRECTORY INTRODUCTION AND ENUMERATION/16.2. Manual Enumeration - Expanding our Repertoire/16.2.4. Enumerating Object Permissions.mp4 19.5 MB
PEN-200 - Penetration Testing with Kali Linux Videos/01. INFORMATION GATHERING/1.2. Active Information Gathering/1.2.5. SNMP Enumeration.mp4 19.4 MB
PEN-200 - Penetration Testing with Kali Linux Videos/07. ANTIVIRUS EVASION/7.1. Antivirus Software Key Components and Operations/7.1.1. Detection Methods.mp4 19.0 MB
PEN-200 - Penetration Testing with Kali Linux Videos/09. FIXING EXPLOITS/9.1. Fixing Memory Corruption Exploits/9.1.4. Changing the Overflow Buffer.mp4 18.6 MB
PEN-200 - Penetration Testing with Kali Linux Videos/10. LOCATING PUBLIC EXPLOITS/10.1. Offline Exploit Resources/10.1.1. SearchSploit.mp4 17.9 MB
PEN-200 - Penetration Testing with Kali Linux Videos/17. ATTACKING ACTIVE DIRECTORY AUTHENTICATION/17.1. Understanding Active Directory Authentication/17.1.1. Cached AD Credentials.mp4 17.9 MB
PEN-200 - Penetration Testing with Kali Linux Videos/15. THE METASPLOIT FRAMEWORK/15.4. Automating Metasploit/15.4.1. Resource Scripts.mp4 17.6 MB
PEN-200 - Penetration Testing with Kali Linux Videos/18. LATERAL MOVEMENT IN ACTIVE DIRECTORY/18.2. Active Directory Persistence/18.2.1. Golden Ticket.mp4 17.6 MB
PEN-200 - Penetration Testing with Kali Linux Videos/08. PASSWORD ATTACKS/8.3. Working with Password Hashes/8.3.4. Relaying Net-NTLMv2.mp4 17.6 MB
PEN-200 - Penetration Testing with Kali Linux Videos/13. PORT REDIRECTION AND SSH TUNNELING/13.2. SSH Tunneling/13.2.3. SSH Remote Port Forwarding.mp4 17.3 MB
PEN-200 - Penetration Testing with Kali Linux Videos/02. VULNERABILITY SCANNING/2.1. Vulnerability Scanning with Nessus/2.1.1. Nessus Components.mp4 17.2 MB
PEN-200 - Penetration Testing with Kali Linux Videos/15. THE METASPLOIT FRAMEWORK/15.1. Getting Familiar with Metasploit/15.1.1. Setup and Work with MSF.mp4 17.2 MB
PEN-200 - Penetration Testing with Kali Linux Videos/17. ATTACKING ACTIVE DIRECTORY AUTHENTICATION/17.2. Performing Attacks on Active Directory Authentication/17.2.2. AS-REP Roasting.mp4 16.9 MB
PEN-200 - Penetration Testing with Kali Linux Videos/06. CLIENT-SIDE ATTACKS/6.1. Target Reconnaissance/6.1.2. Client Fingerprinting.mp4 16.9 MB
PEN-200 - Penetration Testing with Kali Linux Videos/12. LINUX PRIVILEGE ESCALATION/12.2. Exposed Confidential Information/12.2.1. Inspecting User Trails.mp4 16.9 MB
PEN-200 - Penetration Testing with Kali Linux Videos/09. FIXING EXPLOITS/9.2. Fixing Web Exploits/9.2.2. Troubleshooting the 'index out of range' Error.mp4 16.5 MB
PEN-200 - Penetration Testing with Kali Linux Videos/02. VULNERABILITY SCANNING/2.1. Vulnerability Scanning with Nessus/2.1.2. Performing a Vulnerability Scan.mp4 16.4 MB
PEN-200 - Penetration Testing with Kali Linux Videos/04. COMMON WEB APPLICATION ATTACKS/4.2. File Inclusion Vulnerabilities/4.2.2. PHP Wrappers.mp4 16.3 MB
PEN-200 - Penetration Testing with Kali Linux Videos/13. PORT REDIRECTION AND SSH TUNNELING/13.2. SSH Tunneling/13.2.4. SSH Remote Dynamic Port Forwarding.mp4 15.9 MB
PEN-200 - Penetration Testing with Kali Linux Videos/12. LINUX PRIVILEGE ESCALATION/12.4. Insecure System Components/12.4.3. Exploiting Kernel Vulnerabilities.mp4 15.9 MB
PEN-200 - Penetration Testing with Kali Linux Videos/16. ACTIVE DIRECTORY INTRODUCTION AND ENUMERATION/16.2. Manual Enumeration - Expanding our Repertoire/16.2.5. Enumerating Domain Shares.mp4 15.3 MB
PEN-200 - Penetration Testing with Kali Linux Videos/12. LINUX PRIVILEGE ESCALATION/12.4. Insecure System Components/12.4.2. Abusing Sudo.mp4 15.2 MB
PEN-200 - Penetration Testing with Kali Linux Videos/03. INTRODUCTION TO WEB APPLICATION ATTACKS/3.3. Cross-Site Scripting/3.3.1. Basic XSS.mp4 15.1 MB
PEN-200 - Penetration Testing with Kali Linux Videos/08. PASSWORD ATTACKS/8.1. Attacking Network Services Logins/8.1.1. SSH and RDP.mp4 14.4 MB
PEN-200 - Penetration Testing with Kali Linux Videos/05. SQL INJECTION ATTACKS/5.2. Manual SQL Exploitation/5.2.2. UNION-based Payloads.mp4 14.4 MB
PEN-200 - Penetration Testing with Kali Linux Videos/09. FIXING EXPLOITS/9.2. Fixing Web Exploits/9.2.1. Selecting the Vulnerability and Fixing the Code.mp4 14.3 MB
PEN-200 - Penetration Testing with Kali Linux Videos/17. ATTACKING ACTIVE DIRECTORY AUTHENTICATION/17.2. Performing Attacks on Active Directory Authentication/17.2.5. Domain Controller Synchronization.mp4 14.3 MB
PEN-200 - Penetration Testing with Kali Linux Videos/04. COMMON WEB APPLICATION ATTACKS/4.1. Directory Traversal/4.1.1. Absolute vs Relative Paths.mp4 14.2 MB
PEN-200 - Penetration Testing with Kali Linux Videos/01. INFORMATION GATHERING/1.1. Passive Information Gathering/1.1.2. Google Hacking.mp4 13.1 MB
PEN-200 - Penetration Testing with Kali Linux Videos/03. INTRODUCTION TO WEB APPLICATION ATTACKS/3.2. Web Application Enumeration/3.2.1. Debugging Page Content.mp4 13.1 MB
PEN-200 - Penetration Testing with Kali Linux Videos/01. INFORMATION GATHERING/1.2. Active Information Gathering/1.2.3. SMB Enumeration.mp4 12.9 MB
PEN-200 - Penetration Testing with Kali Linux Videos/05. SQL INJECTION ATTACKS/5.2. Manual SQL Exploitation/5.2.1. Identifying SQLi via Error-based Paylaods.mp4 12.5 MB
PEN-200 - Penetration Testing with Kali Linux Videos/13. PORT REDIRECTION AND SSH TUNNELING/13.3. Port Forwarding with Windows Tools/13.3.1. ssh.exe.mp4 12.5 MB
PEN-200 - Penetration Testing with Kali Linux Videos/05. SQL INJECTION ATTACKS/5.1. SQL Theory and Databases/5.1.1. DB Types and Characteristics.mp4 12.4 MB
PEN-200 - Penetration Testing with Kali Linux Videos/03. INTRODUCTION TO WEB APPLICATION ATTACKS/3.2. Web Application Enumeration/3.2.2. Inspecting HTTP Response Headers and Sitemaps.mp4 12.2 MB
PEN-200 - Penetration Testing with Kali Linux Videos/02. VULNERABILITY SCANNING/2.2. Vulnerability Scanning with Nmap/2.2.2. Working with NSE Scripts.mp4 12.2 MB
PEN-200 - Penetration Testing with Kali Linux Videos/06. CLIENT-SIDE ATTACKS/6.1. Target Reconnaissance/6.1.1. Information Gathering.mp4 12.0 MB
PEN-200 - Penetration Testing with Kali Linux Videos/05. SQL INJECTION ATTACKS/5.3. Manual and Automated Code Execution/5.3.1. Manual Code Execution.mp4 11.4 MB
PEN-200 - Penetration Testing with Kali Linux Videos/12. LINUX PRIVILEGE ESCALATION/12.1. Enumerating Linux/12.1.2. Automated Enumeration.mp4 11.3 MB
PEN-200 - Penetration Testing with Kali Linux Videos/15. THE METASPLOIT FRAMEWORK/15.2. Using Metasploit Payloads/15.2.1. Staged vs Non-Staged Payloads.mp4 10.4 MB
PEN-200 - Penetration Testing with Kali Linux Videos/12. LINUX PRIVILEGE ESCALATION/12.3. Insecure File Permissions/12.3.1. Abusing Cron Jobs.mp4 10.3 MB
PEN-200 - Penetration Testing with Kali Linux Videos/18. LATERAL MOVEMENT IN ACTIVE DIRECTORY/18.1. Active Directory Lateral Movement Techniques/18.1.6. DCOM.mp4 10.2 MB
PEN-200 - Penetration Testing with Kali Linux Videos/16. ACTIVE DIRECTORY INTRODUCTION AND ENUMERATION/16.1. Active Directory - Manual Enumeration/16.1.1. Active Directory - Enumeration Using Legacy Windows Tools.mp4 9.9 MB
PEN-200 - Penetration Testing with Kali Linux Videos/16. ACTIVE DIRECTORY INTRODUCTION AND ENUMERATION/16.1. Active Directory - Manual Enumeration/16.1.4. AD Enumeration with PowerView.mp4 9.8 MB
PEN-200 - Penetration Testing with Kali Linux Videos/18. LATERAL MOVEMENT IN ACTIVE DIRECTORY/18.2. Active Directory Persistence/18.2.2. Shadow Copies.mp4 9.8 MB
PEN-200 - Penetration Testing with Kali Linux Videos/01. INFORMATION GATHERING/1.1. Passive Information Gathering/1.1.5. Shodan.mp4 9.8 MB
PEN-200 - Penetration Testing with Kali Linux Videos/16. ACTIVE DIRECTORY INTRODUCTION AND ENUMERATION/16.3. Active Directory - Automated Enumeration/16.3.1. Collecting Data with SharpHound.mp4 8.5 MB
PEN-200 - Penetration Testing with Kali Linux Videos/01. INFORMATION GATHERING/1.2. Active Information Gathering/1.2.4. SMTP Enumeration.mp4 8.1 MB
PEN-200 - Penetration Testing with Kali Linux Videos/01. INFORMATION GATHERING/1.1. Passive Information Gathering/1.1.1. Whois Enumeration.mp4 7.8 MB
PEN-200 - Penetration Testing with Kali Linux Videos/09. FIXING EXPLOITS/9.1. Fixing Memory Corruption Exploits/9.1.2. Cross-Compiling Exploit Code.mp4 7.8 MB
PEN-200 - Penetration Testing with Kali Linux Videos/09. FIXING EXPLOITS/9.1. Fixing Memory Corruption Exploits/9.1.1. Importing and Examining the Exploit.mp4 7.8 MB
PEN-200 - Penetration Testing with Kali Linux Videos/13. PORT REDIRECTION AND SSH TUNNELING/13.1. Port Forwarding with Linux Tools/13.1.1. A Simple Port Forwarding Scenario.mp4 7.7 MB
PEN-200 - Penetration Testing with Kali Linux Videos/12. LINUX PRIVILEGE ESCALATION/12.2. Exposed Confidential Information/12.2.2. Inspecting Service Footprints.mp4 7.7 MB
PEN-200 - Penetration Testing with Kali Linux Videos/01. INFORMATION GATHERING/1.1. Passive Information Gathering/1.1.6. Security Headers and SSL_TLS.mp4 7.4 MB
PEN-200 - Penetration Testing with Kali Linux Videos/05. SQL INJECTION ATTACKS/5.2. Manual SQL Exploitation/5.2.3. Blind SQL Injections.mp4 7.2 MB
PEN-200 - Penetration Testing with Kali Linux Videos/04. COMMON WEB APPLICATION ATTACKS/4.2. File Inclusion Vulnerabilities/4.2.3. Remote File Inclusion (RFI).mp4 7.1 MB
PEN-200 - Penetration Testing with Kali Linux Videos/13. PORT REDIRECTION AND SSH TUNNELING/13.2. SSH Tunneling/13.2.5. Using sshuttle.mp4 7.1 MB
PEN-200 - Penetration Testing with Kali Linux Videos/12. LINUX PRIVILEGE ESCALATION/12.3. Insecure File Permissions/12.3.2. Abusing Password Authentication.mp4 7.0 MB
PEN-200 - Penetration Testing with Kali Linux Videos/16. ACTIVE DIRECTORY INTRODUCTION AND ENUMERATION/16.2. Manual Enumeration - Expanding our Repertoire/16.2.3. Enumeration Through Service Principal Names.mp4 6.6 MB
PEN-200 - Penetration Testing with Kali Linux Videos/01. INFORMATION GATHERING/1.1. Passive Information Gathering/1.1.3. Netcraft.mp4 6.1 MB
PEN-200 - Penetration Testing with Kali Linux Videos/04. COMMON WEB APPLICATION ATTACKS/4.1. Directory Traversal/4.1.3. Encoding Special Characters.mp4 5.9 MB
PEN-200 - Penetration Testing with Kali Linux Videos/01. INFORMATION GATHERING/1.1. Passive Information Gathering/1.1.4. Open-Source Code.mp4 5.2 MB
PEN-200 - Penetration Testing with Kali Linux Videos/14. TUNNELING THROUGH DEEP PACKET INSPECTION/14.1. HTTP Tunneling Theory and Practice/14.1.1. HTTP Tunneling Fundamentals.mp4 4.7 MB
PEN-200 - Penetration Testing with Kali Linux Videos/18. LATERAL MOVEMENT IN ACTIVE DIRECTORY/18.1. Active Directory Lateral Movement Techniques/18.1.2. PsExec.mp4 4.5 MB
PEN-200 - Penetration Testing with Kali Linux Videos/10. LOCATING PUBLIC EXPLOITS/10.1. Offline Exploit Resources/10.1.2. Nmap NSE Scripts.mp4 4.4 MB
PEN-200 - Penetration Testing with Kali Linux Videos/16. ACTIVE DIRECTORY INTRODUCTION AND ENUMERATION/16.2. Manual Enumeration - Expanding our Repertoire/16.2.1. Enumerating Operating Systems.mp4 4.1 MB
PEN-200 - Penetration Testing with Kali Linux Videos/03. INTRODUCTION TO WEB APPLICATION ATTACKS/3.1. Web Application Assessment Tools/3.1.2. Directory Brute Force with Gobuster.mp4 4.0 MB
PEN-200 - Penetration Testing with Kali Linux Videos/18. LATERAL MOVEMENT IN ACTIVE DIRECTORY/18.1. Active Directory Lateral Movement Techniques/18.1.3. Pass the Hash.mp4 3.6 MB
PEN-200 - Penetration Testing with Kali Linux Videos/03. INTRODUCTION TO WEB APPLICATION ATTACKS/3.1. Web Application Assessment Tools/3.1.1. Fingerprinting Web Servers with Nmap.mp4 3.5 MB
PEN-200 - Penetration Testing with Kali Linux Videos/12. LINUX PRIVILEGE ESCALATION/12.1. Enumerating Linux/12.1.1. Manual Enumeration.vtt 24.6 KB
PEN-200 - Penetration Testing with Kali Linux Videos/11. WINDOWS PRIVILEGE ESCALATION/11.1. Enumerating Windows/11.1.1. Situational Awareness.vtt 18.1 KB
PEN-200 - Penetration Testing with Kali Linux Videos/01. INFORMATION GATHERING/1.2. Active Information Gathering/1.2.2. Port Scanning with Nmap.vtt 16.8 KB
PEN-200 - Penetration Testing with Kali Linux Videos/16. ACTIVE DIRECTORY INTRODUCTION AND ENUMERATION/16.2. Manual Enumeration - Expanding our Repertoire/16.2.2. Getting an Overview - Permissions and Logged on Users.vtt 16.3 KB
PEN-200 - Penetration Testing with Kali Linux Videos/11. WINDOWS PRIVILEGE ESCALATION/11.2. Leveraging Windows Services/11.2.1. Service Binary Hijacking.vtt 15.5 KB
PEN-200 - Penetration Testing with Kali Linux Videos/11. WINDOWS PRIVILEGE ESCALATION/11.2. Leveraging Windows Services/11.2.2. Service DLL Hijacking.vtt 15.1 KB
PEN-200 - Penetration Testing with Kali Linux Videos/16. ACTIVE DIRECTORY INTRODUCTION AND ENUMERATION/16.3. Active Directory - Automated Enumeration/16.3.2. Analysing Data using BloodHound.vtt 13.6 KB
PEN-200 - Penetration Testing with Kali Linux Videos/06. CLIENT-SIDE ATTACKS/6.3. Abusing Windows Library Files/6.3.1. Obtaining Code Execution via Windows Library Files.vtt 13.2 KB
PEN-200 - Penetration Testing with Kali Linux Videos/11. WINDOWS PRIVILEGE ESCALATION/11.1. Enumerating Windows/11.1.3. Information Goldmine PowerShell.vtt 12.9 KB
PEN-200 - Penetration Testing with Kali Linux Videos/11. WINDOWS PRIVILEGE ESCALATION/11.2. Leveraging Windows Services/11.2.3. Unquoted Service Paths.vtt 12.5 KB
PEN-200 - Penetration Testing with Kali Linux Videos/08. PASSWORD ATTACKS/8.2. Password Cracking Fundamentals/8.2.2. Mutating Wordlists.vtt 12.4 KB
PEN-200 - Penetration Testing with Kali Linux Videos/16. ACTIVE DIRECTORY INTRODUCTION AND ENUMERATION/16.1. Active Directory - Manual Enumeration/16.1.3. Adding Search Functionality to our Script.vtt 11.9 KB
PEN-200 - Penetration Testing with Kali Linux Videos/14. TUNNELING THROUGH DEEP PACKET INSPECTION/14.2. DNS Tunneling Theory and Practice/14.2.1. DNS Tunneling Fundamentals.vtt 11.7 KB
PEN-200 - Penetration Testing with Kali Linux Videos/13. PORT REDIRECTION AND SSH TUNNELING/13.2. SSH Tunneling/13.2.1. SSH Local Port Forwarding.vtt 11.7 KB
PEN-200 - Penetration Testing with Kali Linux Videos/15. THE METASPLOIT FRAMEWORK/15.1. Getting Familiar with Metasploit/15.1.3. Exploit Modules.vtt 11.3 KB
PEN-200 - Penetration Testing with Kali Linux Videos/17. ATTACKING ACTIVE DIRECTORY AUTHENTICATION/17.2. Performing Attacks on Active Directory Authentication/17.2.1. Password Attacks.vtt 10.9 KB
PEN-200 - Penetration Testing with Kali Linux Videos/07. ANTIVIRUS EVASION/7.2. AV Evasion in Practice/7.2.1. Evading AV with Thread Injection.vtt 10.3 KB
PEN-200 - Penetration Testing with Kali Linux Videos/03. INTRODUCTION TO WEB APPLICATION ATTACKS/3.2. Web Application Enumeration/3.2.3. Enumerating and Abusing APIs.vtt 10.2 KB
PEN-200 - Penetration Testing with Kali Linux Videos/11. WINDOWS PRIVILEGE ESCALATION/11.1. Enumerating Windows/11.1.2. Hidden in Plain View.vtt 9.8 KB
PEN-200 - Penetration Testing with Kali Linux Videos/11. WINDOWS PRIVILEGE ESCALATION/11.3. Abusing Other Windows Components/11.3.2. Using Exploits.vtt 9.7 KB
PEN-200 - Penetration Testing with Kali Linux Videos/01. INFORMATION GATHERING/1.2. Active Information Gathering/1.2.1. DNS Enumeration.vtt 9.7 KB
PEN-200 - Penetration Testing with Kali Linux Videos/03. INTRODUCTION TO WEB APPLICATION ATTACKS/3.3. Cross-Site Scripting/3.3.2. Privilege Escalation via XSS.vtt 9.3 KB
PEN-200 - Penetration Testing with Kali Linux Videos/04. COMMON WEB APPLICATION ATTACKS/4.2. File Inclusion Vulnerabilities/4.2.1. Local File Inclusion (LFI).vtt 9.2 KB
PEN-200 - Penetration Testing with Kali Linux Videos/15. THE METASPLOIT FRAMEWORK/15.2. Using Metasploit Payloads/15.2.2. Meterpreter Payload.vtt 9.2 KB
PEN-200 - Penetration Testing with Kali Linux Videos/03. INTRODUCTION TO WEB APPLICATION ATTACKS/3.1. Web Application Assessment Tools/3.1.3. Security Testing with Burp Suite.vtt 9.0 KB
PEN-200 - Penetration Testing with Kali Linux Videos/15. THE METASPLOIT FRAMEWORK/15.3. Performing Post-Exploitation with Metasploit/15.3.1. Core Meterpreter Post-Exploitation Features.vtt 8.8 KB
PEN-200 - Penetration Testing with Kali Linux Videos/06. CLIENT-SIDE ATTACKS/6.2. Exploiting Microsoft Office/6.2.1. Leveraging Microsoft Word Macros.vtt 8.8 KB
PEN-200 - Penetration Testing with Kali Linux Videos/14. TUNNELING THROUGH DEEP PACKET INSPECTION/14.1. HTTP Tunneling Theory and Practice/14.1.2. HTTP Tunneling with Chisel.vtt 8.7 KB
PEN-200 - Penetration Testing with Kali Linux Videos/13. PORT REDIRECTION AND SSH TUNNELING/13.2. SSH Tunneling/13.2.2. SSH Dynamic Port Forwarding.vtt 8.5 KB
PEN-200 - Penetration Testing with Kali Linux Videos/08. PASSWORD ATTACKS/8.2. Password Cracking Fundamentals/8.2.4. SSH Private Key Passphrase.vtt 8.5 KB
PEN-200 - Penetration Testing with Kali Linux Videos/04. COMMON WEB APPLICATION ATTACKS/4.1. Directory Traversal/4.1.2. Identifying and Exploiting Directory Traversals.vtt 8.5 KB
PEN-200 - Penetration Testing with Kali Linux Videos/08. PASSWORD ATTACKS/8.2. Password Cracking Fundamentals/8.2.1. Introduction to Encryption, Hashes and Cracking.vtt 8.2 KB
PEN-200 - Penetration Testing with Kali Linux Videos/15. THE METASPLOIT FRAMEWORK/15.3. Performing Post-Exploitation with Metasploit/15.3.3. Pivoting with Metasploit.vtt 8.2 KB
PEN-200 - Penetration Testing with Kali Linux Videos/13. PORT REDIRECTION AND SSH TUNNELING/13.1. Port Forwarding with Linux Tools/13.1.2. Setting Up the Lab Environment.vtt 8.1 KB
PEN-200 - Penetration Testing with Kali Linux Videos/12. LINUX PRIVILEGE ESCALATION/12.4. Insecure System Components/12.4.1. Abusing Setuid Binaries and Capabilities.vtt 8.0 KB
PEN-200 - Penetration Testing with Kali Linux Videos/10. LOCATING PUBLIC EXPLOITS/10.2. Exploiting a Target/10.2.1. Putting It Together.vtt 8.0 KB
PEN-200 - Penetration Testing with Kali Linux Videos/08. PASSWORD ATTACKS/8.3. Working with Password Hashes/8.3.2. Passing NTLM.vtt 7.9 KB
PEN-200 - Penetration Testing with Kali Linux Videos/18. LATERAL MOVEMENT IN ACTIVE DIRECTORY/18.1. Active Directory Lateral Movement Techniques/18.1.1. WMI and WinRM.vtt 7.7 KB
PEN-200 - Penetration Testing with Kali Linux Videos/04. COMMON WEB APPLICATION ATTACKS/4.4. Command Injection/4.4.1. OS Command Injection.vtt 7.7 KB
PEN-200 - Penetration Testing with Kali Linux Videos/16. ACTIVE DIRECTORY INTRODUCTION AND ENUMERATION/16.2. Manual Enumeration - Expanding our Repertoire/16.2.4. Enumerating Object Permissions.vtt 7.6 KB
PEN-200 - Penetration Testing with Kali Linux Videos/15. THE METASPLOIT FRAMEWORK/15.1. Getting Familiar with Metasploit/15.1.2. Auxiliary Modules.vtt 7.5 KB
PEN-200 - Penetration Testing with Kali Linux Videos/17. ATTACKING ACTIVE DIRECTORY AUTHENTICATION/17.2. Performing Attacks on Active Directory Authentication/17.2.4. Silver Tickets.vtt 7.5 KB
PEN-200 - Penetration Testing with Kali Linux Videos/04. COMMON WEB APPLICATION ATTACKS/4.3. File Upload Vulnerabilities/4.3.2. Using Non-Executable Files.vtt 7.5 KB
PEN-200 - Penetration Testing with Kali Linux Videos/04. COMMON WEB APPLICATION ATTACKS/4.3. File Upload Vulnerabilities/4.3.1. Using Executable Files.vtt 7.3 KB
PEN-200 - Penetration Testing with Kali Linux Videos/07. ANTIVIRUS EVASION/7.2. AV Evasion in Practice/7.2.2. Automating the Process.vtt 7.2 KB
PEN-200 - Penetration Testing with Kali Linux Videos/02. VULNERABILITY SCANNING/2.1. Vulnerability Scanning with Nessus/2.1.4. Performing an Authenticated Vulnerability Scan.vtt 6.9 KB
PEN-200 - Penetration Testing with Kali Linux Videos/13. PORT REDIRECTION AND SSH TUNNELING/13.1. Port Forwarding with Linux Tools/13.1.3. Port Forwarding with Socat.vtt 6.9 KB
PEN-200 - Penetration Testing with Kali Linux Videos/13. PORT REDIRECTION AND SSH TUNNELING/13.2. SSH Tunneling/13.2.3. SSH Remote Port Forwarding.vtt 6.7 KB
PEN-200 - Penetration Testing with Kali Linux Videos/02. VULNERABILITY SCANNING/2.1. Vulnerability Scanning with Nessus/2.1.3. Analyzing the Results.vtt 6.6 KB
PEN-200 - Penetration Testing with Kali Linux Videos/13. PORT REDIRECTION AND SSH TUNNELING/13.3. Port Forwarding with Windows Tools/13.3.2. Plink.vtt 6.6 KB
PEN-200 - Penetration Testing with Kali Linux Videos/15. THE METASPLOIT FRAMEWORK/15.1. Getting Familiar with Metasploit/15.1.1. Setup and Work with MSF.vtt 6.5 KB
PEN-200 - Penetration Testing with Kali Linux Videos/15. THE METASPLOIT FRAMEWORK/15.2. Using Metasploit Payloads/15.2.3. Executable Payloads.vtt 6.5 KB
PEN-200 - Penetration Testing with Kali Linux Videos/05. SQL INJECTION ATTACKS/5.2. Manual SQL Exploitation/5.2.2. UNION-based Payloads.vtt 6.3 KB
PEN-200 - Penetration Testing with Kali Linux Videos/08. PASSWORD ATTACKS/8.2. Password Cracking Fundamentals/8.2.3. Password Manager.vtt 6.3 KB
PEN-200 - Penetration Testing with Kali Linux Videos/07. ANTIVIRUS EVASION/7.1. Antivirus Software Key Components and Operations/7.1.1. Detection Methods.vtt 6.2 KB
PEN-200 - Penetration Testing with Kali Linux Videos/06. CLIENT-SIDE ATTACKS/6.1. Target Reconnaissance/6.1.2. Client Fingerprinting.vtt 6.2 KB
PEN-200 - Penetration Testing with Kali Linux Videos/13. PORT REDIRECTION AND SSH TUNNELING/13.2. SSH Tunneling/13.2.4. SSH Remote Dynamic Port Forwarding.vtt 6.0 KB
PEN-200 - Penetration Testing with Kali Linux Videos/01. INFORMATION GATHERING/1.2. Active Information Gathering/1.2.5. SNMP Enumeration.vtt 6.0 KB
PEN-200 - Penetration Testing with Kali Linux Videos/16. ACTIVE DIRECTORY INTRODUCTION AND ENUMERATION/16.1. Active Directory - Manual Enumeration/16.1.2. Enumerating Active Directory using PowerShell and .NET Classes.vtt 6.0 KB
PEN-200 - Penetration Testing with Kali Linux Videos/11. WINDOWS PRIVILEGE ESCALATION/11.1. Enumerating Windows/11.1.4. Automated Enumeration.vtt 6.0 KB
PEN-200 - Penetration Testing with Kali Linux Videos/04. COMMON WEB APPLICATION ATTACKS/4.2. File Inclusion Vulnerabilities/4.2.2. PHP Wrappers.vtt 5.9 KB
PEN-200 - Penetration Testing with Kali Linux Videos/13. PORT REDIRECTION AND SSH TUNNELING/13.3. Port Forwarding with Windows Tools/13.3.3. Netsh.vtt 5.8 KB
PEN-200 - Penetration Testing with Kali Linux Videos/15. THE METASPLOIT FRAMEWORK/15.3. Performing Post-Exploitation with Metasploit/15.3.2. Post-Exploitation Modules.vtt 5.8 KB
PEN-200 - Penetration Testing with Kali Linux Videos/02. VULNERABILITY SCANNING/2.1. Vulnerability Scanning with Nessus/2.1.2. Performing a Vulnerability Scan.vtt 5.8 KB
PEN-200 - Penetration Testing with Kali Linux Videos/08. PASSWORD ATTACKS/8.1. Attacking Network Services Logins/8.1.2. HTTP POST Login Form.vtt 5.8 KB
PEN-200 - Penetration Testing with Kali Linux Videos/15. THE METASPLOIT FRAMEWORK/15.4. Automating Metasploit/15.4.1. Resource Scripts.vtt 5.7 KB
PEN-200 - Penetration Testing with Kali Linux Videos/12. LINUX PRIVILEGE ESCALATION/12.4. Insecure System Components/12.4.3. Exploiting Kernel Vulnerabilities.vtt 5.6 KB
PEN-200 - Penetration Testing with Kali Linux Videos/05. SQL INJECTION ATTACKS/5.1. SQL Theory and Databases/5.1.1. DB Types and Characteristics.vtt 5.6 KB
PEN-200 - Penetration Testing with Kali Linux Videos/14. TUNNELING THROUGH DEEP PACKET INSPECTION/14.2. DNS Tunneling Theory and Practice/14.2.2. DNS Tunneling with dnscat2.vtt 5.5 KB
PEN-200 - Penetration Testing with Kali Linux Videos/12. LINUX PRIVILEGE ESCALATION/12.2. Exposed Confidential Information/12.2.1. Inspecting User Trails.vtt 5.5 KB
PEN-200 - Penetration Testing with Kali Linux Videos/08. PASSWORD ATTACKS/8.3. Working with Password Hashes/8.3.1. Cracking NTLM.vtt 5.3 KB
PEN-200 - Penetration Testing with Kali Linux Videos/02. VULNERABILITY SCANNING/2.1. Vulnerability Scanning with Nessus/2.1.5. Working with Nessus Plugins.vtt 5.3 KB
PEN-200 - Penetration Testing with Kali Linux Videos/02. VULNERABILITY SCANNING/2.2. Vulnerability Scanning with Nmap/2.2.1. NSE Vulnerability Scripts.vtt 5.2 KB
PEN-200 - Penetration Testing with Kali Linux Videos/05. SQL INJECTION ATTACKS/5.2. Manual SQL Exploitation/5.2.1. Identifying SQLi via Error-based Paylaods.vtt 5.2 KB
PEN-200 - Penetration Testing with Kali Linux Videos/16. ACTIVE DIRECTORY INTRODUCTION AND ENUMERATION/16.2. Manual Enumeration - Expanding our Repertoire/16.2.5. Enumerating Domain Shares.vtt 5.1 KB
PEN-200 - Penetration Testing with Kali Linux Videos/18. LATERAL MOVEMENT IN ACTIVE DIRECTORY/18.1. Active Directory Lateral Movement Techniques/18.1.4. Overpass the Hash.vtt 5.0 KB
PEN-200 - Penetration Testing with Kali Linux Videos/01. INFORMATION GATHERING/1.1. Passive Information Gathering/1.1.2. Google Hacking.vtt 4.9 KB
PEN-200 - Penetration Testing with Kali Linux Videos/18. LATERAL MOVEMENT IN ACTIVE DIRECTORY/18.2. Active Directory Persistence/18.2.1. Golden Ticket.vtt 4.9 KB
PEN-200 - Penetration Testing with Kali Linux Videos/17. ATTACKING ACTIVE DIRECTORY AUTHENTICATION/17.1. Understanding Active Directory Authentication/17.1.1. Cached AD Credentials.vtt 4.9 KB
PEN-200 - Penetration Testing with Kali Linux Videos/08. PASSWORD ATTACKS/8.3. Working with Password Hashes/8.3.3. Cracking Net-NTLMv2.vtt 4.7 KB
PEN-200 - Penetration Testing with Kali Linux Videos/16. ACTIVE DIRECTORY INTRODUCTION AND ENUMERATION/16.1. Active Directory - Manual Enumeration/16.1.4. AD Enumeration with PowerView.vtt 4.7 KB
PEN-200 - Penetration Testing with Kali Linux Videos/01. INFORMATION GATHERING/1.2. Active Information Gathering/1.2.3. SMB Enumeration.vtt 4.5 KB
PEN-200 - Penetration Testing with Kali Linux Videos/04. COMMON WEB APPLICATION ATTACKS/4.1. Directory Traversal/4.1.1. Absolute vs Relative Paths.vtt 4.4 KB
PEN-200 - Penetration Testing with Kali Linux Videos/11. WINDOWS PRIVILEGE ESCALATION/11.3. Abusing Other Windows Components/11.3.1. Scheduled Tasks.vtt 4.4 KB
PEN-200 - Penetration Testing with Kali Linux Videos/02. VULNERABILITY SCANNING/2.1. Vulnerability Scanning with Nessus/2.1.1. Nessus Components.vtt 4.4 KB
PEN-200 - Penetration Testing with Kali Linux Videos/08. PASSWORD ATTACKS/8.3. Working with Password Hashes/8.3.4. Relaying Net-NTLMv2.vtt 4.3 KB
PEN-200 - Penetration Testing with Kali Linux Videos/13. PORT REDIRECTION AND SSH TUNNELING/13.1. Port Forwarding with Linux Tools/13.1.1. A Simple Port Forwarding Scenario.vtt 4.3 KB
PEN-200 - Penetration Testing with Kali Linux Videos/17. ATTACKING ACTIVE DIRECTORY AUTHENTICATION/17.2. Performing Attacks on Active Directory Authentication/17.2.2. AS-REP Roasting.vtt 4.3 KB
PEN-200 - Penetration Testing with Kali Linux Videos/05. SQL INJECTION ATTACKS/5.3. Manual and Automated Code Execution/5.3.1. Manual Code Execution.vtt 4.2 KB
PEN-200 - Penetration Testing with Kali Linux Videos/09. FIXING EXPLOITS/9.1. Fixing Memory Corruption Exploits/9.1.3. Fixing the Exploit.vtt 4.2 KB
PEN-200 - Penetration Testing with Kali Linux Videos/17. ATTACKING ACTIVE DIRECTORY AUTHENTICATION/17.2. Performing Attacks on Active Directory Authentication/17.2.3. Kerberoasting.vtt 4.1 KB
PEN-200 - Penetration Testing with Kali Linux Videos/06. CLIENT-SIDE ATTACKS/6.1. Target Reconnaissance/6.1.1. Information Gathering.vtt 4.1 KB
PEN-200 - Penetration Testing with Kali Linux Videos/16. ACTIVE DIRECTORY INTRODUCTION AND ENUMERATION/16.1. Active Directory - Manual Enumeration/16.1.1. Active Directory - Enumeration Using Legacy Windows Tools.vtt 4.0 KB
PEN-200 - Penetration Testing with Kali Linux Videos/12. LINUX PRIVILEGE ESCALATION/12.4. Insecure System Components/12.4.2. Abusing Sudo.vtt 3.9 KB
PEN-200 - Penetration Testing with Kali Linux Videos/08. PASSWORD ATTACKS/8.1. Attacking Network Services Logins/8.1.1. SSH and RDP.vtt 3.9 KB
PEN-200 - Penetration Testing with Kali Linux Videos/10. LOCATING PUBLIC EXPLOITS/10.1. Offline Exploit Resources/10.1.1. SearchSploit.vtt 3.9 KB
PEN-200 - Penetration Testing with Kali Linux Videos/18. LATERAL MOVEMENT IN ACTIVE DIRECTORY/18.1. Active Directory Lateral Movement Techniques/18.1.5. Pass the Ticket.vtt 3.8 KB
PEN-200 - Penetration Testing with Kali Linux Videos/13. PORT REDIRECTION AND SSH TUNNELING/13.3. Port Forwarding with Windows Tools/13.3.1. ssh.exe.vtt 3.7 KB
PEN-200 - Penetration Testing with Kali Linux Videos/17. ATTACKING ACTIVE DIRECTORY AUTHENTICATION/17.2. Performing Attacks on Active Directory Authentication/17.2.5. Domain Controller Synchronization.vtt 3.7 KB
PEN-200 - Penetration Testing with Kali Linux Videos/05. SQL INJECTION ATTACKS/5.3. Manual and Automated Code Execution/5.3.2. Automating the Attack.vtt 3.6 KB
PEN-200 - Penetration Testing with Kali Linux Videos/03. INTRODUCTION TO WEB APPLICATION ATTACKS/3.2. Web Application Enumeration/3.2.1. Debugging Page Content.vtt 3.5 KB
PEN-200 - Penetration Testing with Kali Linux Videos/12. LINUX PRIVILEGE ESCALATION/12.2. Exposed Confidential Information/12.2.2. Inspecting Service Footprints.vtt 3.5 KB
PEN-200 - Penetration Testing with Kali Linux Videos/09. FIXING EXPLOITS/9.1. Fixing Memory Corruption Exploits/9.1.4. Changing the Overflow Buffer.vtt 3.5 KB
PEN-200 - Penetration Testing with Kali Linux Videos/09. FIXING EXPLOITS/9.2. Fixing Web Exploits/9.2.1. Selecting the Vulnerability and Fixing the Code.vtt 3.4 KB
PEN-200 - Penetration Testing with Kali Linux Videos/03. INTRODUCTION TO WEB APPLICATION ATTACKS/3.2. Web Application Enumeration/3.2.2. Inspecting HTTP Response Headers and Sitemaps.vtt 3.3 KB
PEN-200 - Penetration Testing with Kali Linux Videos/12. LINUX PRIVILEGE ESCALATION/12.3. Insecure File Permissions/12.3.1. Abusing Cron Jobs.vtt 3.3 KB
PEN-200 - Penetration Testing with Kali Linux Videos/02. VULNERABILITY SCANNING/2.2. Vulnerability Scanning with Nmap/2.2.2. Working with NSE Scripts.vtt 3.3 KB
PEN-200 - Penetration Testing with Kali Linux Videos/15. THE METASPLOIT FRAMEWORK/15.2. Using Metasploit Payloads/15.2.1. Staged vs Non-Staged Payloads.vtt 3.3 KB
PEN-200 - Penetration Testing with Kali Linux Videos/05. SQL INJECTION ATTACKS/5.2. Manual SQL Exploitation/5.2.3. Blind SQL Injections.vtt 3.3 KB
PEN-200 - Penetration Testing with Kali Linux Videos/12. LINUX PRIVILEGE ESCALATION/12.1. Enumerating Linux/12.1.2. Automated Enumeration.vtt 3.2 KB
PEN-200 - Penetration Testing with Kali Linux Videos/03. INTRODUCTION TO WEB APPLICATION ATTACKS/3.3. Cross-Site Scripting/3.3.1. Basic XSS.vtt 3.1 KB
PEN-200 - Penetration Testing with Kali Linux Videos/09. FIXING EXPLOITS/9.2. Fixing Web Exploits/9.2.2. Troubleshooting the 'index out of range' Error.vtt 3.0 KB
PEN-200 - Penetration Testing with Kali Linux Videos/16. ACTIVE DIRECTORY INTRODUCTION AND ENUMERATION/16.3. Active Directory - Automated Enumeration/16.3.1. Collecting Data with SharpHound.vtt 3.0 KB
PEN-200 - Penetration Testing with Kali Linux Videos/04. COMMON WEB APPLICATION ATTACKS/4.2. File Inclusion Vulnerabilities/4.2.3. Remote File Inclusion (RFI).vtt 3.0 KB
PEN-200 - Penetration Testing with Kali Linux Videos/12. LINUX PRIVILEGE ESCALATION/12.3. Insecure File Permissions/12.3.2. Abusing Password Authentication.vtt 3.0 KB
PEN-200 - Penetration Testing with Kali Linux Videos/09. FIXING EXPLOITS/9.1. Fixing Memory Corruption Exploits/9.1.1. Importing and Examining the Exploit.vtt 2.9 KB
PEN-200 - Penetration Testing with Kali Linux Videos/18. LATERAL MOVEMENT IN ACTIVE DIRECTORY/18.1. Active Directory Lateral Movement Techniques/18.1.6. DCOM.vtt 2.8 KB
PEN-200 - Penetration Testing with Kali Linux Videos/18. LATERAL MOVEMENT IN ACTIVE DIRECTORY/18.2. Active Directory Persistence/18.2.2. Shadow Copies.vtt 2.7 KB
PEN-200 - Penetration Testing with Kali Linux Videos/01. INFORMATION GATHERING/1.2. Active Information Gathering/1.2.4. SMTP Enumeration.vtt 2.6 KB
PEN-200 - Penetration Testing with Kali Linux Videos/13. PORT REDIRECTION AND SSH TUNNELING/13.2. SSH Tunneling/13.2.5. Using sshuttle.vtt 2.5 KB
PEN-200 - Penetration Testing with Kali Linux Videos/01. INFORMATION GATHERING/1.1. Passive Information Gathering/1.1.6. Security Headers and SSL_TLS.vtt 2.5 KB
PEN-200 - Penetration Testing with Kali Linux Videos/04. COMMON WEB APPLICATION ATTACKS/4.1. Directory Traversal/4.1.3. Encoding Special Characters.vtt 2.3 KB
PEN-200 - Penetration Testing with Kali Linux Videos/01. INFORMATION GATHERING/1.1. Passive Information Gathering/1.1.5. Shodan.vtt 2.3 KB
PEN-200 - Penetration Testing with Kali Linux Videos/09. FIXING EXPLOITS/9.1. Fixing Memory Corruption Exploits/9.1.2. Cross-Compiling Exploit Code.vtt 2.2 KB
PEN-200 - Penetration Testing with Kali Linux Videos/16. ACTIVE DIRECTORY INTRODUCTION AND ENUMERATION/16.2. Manual Enumeration - Expanding our Repertoire/16.2.3. Enumeration Through Service Principal Names.vtt 2.1 KB
PEN-200 - Penetration Testing with Kali Linux Videos/14. TUNNELING THROUGH DEEP PACKET INSPECTION/14.1. HTTP Tunneling Theory and Practice/14.1.1. HTTP Tunneling Fundamentals.vtt 1.9 KB
PEN-200 - Penetration Testing with Kali Linux Videos/01. INFORMATION GATHERING/1.1. Passive Information Gathering/1.1.1. Whois Enumeration.vtt 1.8 KB
PEN-200 - Penetration Testing with Kali Linux Videos/01. INFORMATION GATHERING/1.1. Passive Information Gathering/1.1.4. Open-Source Code.vtt 1.7 KB
PEN-200 - Penetration Testing with Kali Linux Videos/16. ACTIVE DIRECTORY INTRODUCTION AND ENUMERATION/16.2. Manual Enumeration - Expanding our Repertoire/16.2.1. Enumerating Operating Systems.vtt 1.7 KB
PEN-200 - Penetration Testing with Kali Linux Videos/03. INTRODUCTION TO WEB APPLICATION ATTACKS/3.1. Web Application Assessment Tools/3.1.2. Directory Brute Force with Gobuster.vtt 1.6 KB
PEN-200 - Penetration Testing with Kali Linux Videos/01. INFORMATION GATHERING/1.1. Passive Information Gathering/1.1.3. Netcraft.vtt 1.5 KB
PEN-200 - Penetration Testing with Kali Linux Videos/18. LATERAL MOVEMENT IN ACTIVE DIRECTORY/18.1. Active Directory Lateral Movement Techniques/18.1.2. PsExec.vtt 1.3 KB
PEN-200 - Penetration Testing with Kali Linux Videos/03. INTRODUCTION TO WEB APPLICATION ATTACKS/3.1. Web Application Assessment Tools/3.1.1. Fingerprinting Web Servers with Nmap.vtt 1.3 KB
PEN-200 - Penetration Testing with Kali Linux Videos/10. LOCATING PUBLIC EXPLOITS/10.1. Offline Exploit Resources/10.1.2. Nmap NSE Scripts.vtt 1.2 KB
PEN-200 - Penetration Testing with Kali Linux Videos/18. LATERAL MOVEMENT IN ACTIVE DIRECTORY/18.1. Active Directory Lateral Movement Techniques/18.1.3. Pass the Hash.vtt 1.0 KB
If the content above is not authorized, please contact us via activebusinesscommunication[AT]gmail.com. Remember to include the full url in your complaint.