FileMood

Download Hacking with python By Don

Hacking with python By Don

Name

Hacking with python By Don

  DOWNLOAD Copy Link

Trouble downloading? see How To

Total Size

109.5 GB

Total Files

2870

Last Seen

2025-07-20 23:45

Hash

4B06D9B3D4B961077DF815372AC4F7B0FA02B1F4

/9. Week 9/

1. Password Cracking.mp4

541.4 MB

1. Password Cracking.srt

34.4 KB

2. Phising attack.mp4

132.8 MB

2. Phising attack.srt

7.6 KB

3. Maloeware.mp4

362.8 MB

3. Maloeware.srt

23.6 KB

4. Wifi Hacking.mp4

237.8 MB

4. Wifi Hacking.srt

17.3 KB

5. Dos and DDos attack.mp4

235.9 MB

5. Dos and DDos attack.srt

15.5 KB

/1. Welcome/

1. Introduction.srt

2.2 KB

1.1 Public Free Resources.pdf.pdf

150.8 KB

1. Introduction.mp4

32.4 MB

/.../2. Resources Virtual Machines Setup/

1. Resources Setup.mp4

31.8 MB

1. Resources Setup.srt

2.7 KB

1.1 Dropbox Resources.html

0.1 KB

/3. Background/

1. Introduction.mp4

88.2 MB

1. Introduction.srt

7.9 KB

2. Fog of Law.mp4

130.8 MB

2. Fog of Law.srt

11.7 KB

3. What is Penetration Testing.mp4

101.9 MB

3. What is Penetration Testing.srt

9.4 KB

/.../4. Bash, The Terminal & Scripting/

1. Introduction to the Terminal.mp4

85.4 MB

1. Introduction to the Terminal.srt

9.2 KB

2. BASH.mp4

289.0 MB

2. BASH.srt

29.0 KB

3. More BASH.mp4

147.8 MB

3. More BASH.srt

14.1 KB

4. More More BASH.mp4

66.7 MB

4. More More BASH.srt

6.1 KB

5. BASH Scripting.mp4

224.7 MB

5. BASH Scripting.srt

22.1 KB

/5. Netcat/

1. Netcat Introduction.mp4

51.1 MB

1. Netcat Introduction.srt

4.5 KB

2. Netcat Demo.mp4

16.0 MB

2. Netcat Demo.srt

1.9 KB

/6. nmap/

1. nmap Introduction.mp4

183.2 MB

1. nmap Introduction.srt

15.8 KB

2. nmap Scan Techniques.mp4

281.8 MB

2. nmap Scan Techniques.srt

26.4 KB

/7. Passive Reconnaissance/

1. Email Enumeration.mp4

53.4 MB

1. Email Enumeration.srt

4.4 KB

2. WHOIS Fingerprinting.mp4

23.4 MB

2. WHOIS Fingerprinting.srt

1.9 KB

3. Google Hacking.mp4

139.9 MB

3. Google Hacking.srt

11.0 KB

/8. Active Reconnaissance/

1. DNS Enumeration.mp4

122.1 MB

1. DNS Enumeration.srt

9.2 KB

2. Metadata.mp4

21.6 MB

2. Metadata.srt

1.9 KB

3. Dirbuster.mp4

39.7 MB

3. Dirbuster.srt

3.1 KB

4. Public Passwords.mp4

75.8 MB

4. Public Passwords.srt

6.8 KB

/9. Security Vulnerabilities/

1. Why.mp4

43.2 MB

1. Why.srt

3.8 KB

2. Heartbleed.mp4

229.1 MB

2. Heartbleed.srt

19.9 KB

3. Dirty COW 1.mp4

224.9 MB

3. Dirty COW 1.srt

18.7 KB

4. Dirty COW Demo.mp4

44.5 MB

4. Dirty COW Demo.srt

4.4 KB

5. Shellshock.mp4

403.9 MB

5. Shellshock.srt

32.2 KB

/.../10. Vulnerability Scanning/

1. Introduction.mp4

59.5 MB

1. Introduction.srt

5.5 KB

2. Dirb.mp4

101.3 MB

2. Dirb.srt

8.9 KB

3. Nikto.mp4

48.8 MB

3. Nikto.srt

4.8 KB

4. Arachni.mp4

188.0 MB

4. Arachni.srt

16.9 KB

5. WordPress Scanner.mp4

68.5 MB

5. WordPress Scanner.srt

6.8 KB

6. Nessus.mp4

126.0 MB

6. Nessus.srt

12.5 KB

/.../11. Metasploit, Meterpreter & MSFVenom/

1. Introduction.mp4

244.1 MB

1. Introduction.srt

23.4 KB

2. Auxiliary Modules.mp4

51.8 MB

2. Auxiliary Modules.srt

4.2 KB

3. Exploitation Modules.mp4

56.7 MB

3. Exploitation Modules.srt

5.3 KB

4. Meterpreter.mp4

111.6 MB

4. Meterpreter.srt

11.2 KB

5. POST Modules.mp4

51.2 MB

5. POST Modules.srt

3.7 KB

6. MS17-010 EternalBlue Exploitation Demo.mp4

9.2 MB

6. MS17-010 EternalBlue Exploitation Demo.srt

0.9 KB

7. MSFVenom.mp4

115.7 MB

7. MSFVenom.srt

10.1 KB

8. MSFVenom & Word Docs.mp4

64.5 MB

8. MSFVenom & Word Docs.srt

5.8 KB

9. Meterpreter Persistence.mp4

71.0 MB

9. Meterpreter Persistence.srt

6.7 KB

/.../12. World Wide Web Overview/

1. Crash Course Introduction into WWW.mp4

58.3 MB

1. Crash Course Introduction into WWW.srt

4.5 KB

2. URIs.mp4

100.6 MB

2. URIs.srt

7.3 KB

3. HTTP.mp4

114.6 MB

3. HTTP.srt

9.6 KB

4. HTTP Security.mp4

70.1 MB

4. HTTP Security.srt

5.5 KB

5. HTML.mp4

68.0 MB

5. HTML.srt

4.9 KB

6. HTML Character Referencing.mp4

32.1 MB

6. HTML Character Referencing.srt

2.3 KB

7. HTML Forms.mp4

80.7 MB

7. HTML Forms.srt

6.0 KB

8. HTML State Cookies.mp4

133.2 MB

8. HTML State Cookies.srt

11.5 KB

/.../13. SQL Injection/

1. SQLi Introduction.mp4

219.0 MB

1. SQLi Introduction.srt

15.3 KB

2. My First SQLi.mp4

250.9 MB

2. My First SQLi.srt

15.4 KB

3. Out of the box SQLi.mp4

108.9 MB

3. Out of the box SQLi.srt

8.2 KB

4. Other SQLi Attacks.mp4

197.0 MB

4. Other SQLi Attacks.srt

13.1 KB

5. Summary.mp4

6.5 MB

5. Summary.srt

0.4 KB

6. Mitigations.mp4

83.0 MB

6. Mitigations.srt

6.9 KB

7. Automating SQLi with SQLmap.mp4

146.7 MB

7. Automating SQLi with SQLmap.srt

9.8 KB

/14. Burpsuite/

1. Burpsuite Overview.mp4

299.0 MB

1. Burpsuite Overview.srt

24.2 KB

/.../15. XSS (Cross-Site Scripting)/

1. Introduction.mp4

93.4 MB

1. Introduction.srt

7.9 KB

2. XSS.mp4

35.9 MB

2. XSS.srt

2.8 KB

3. Reflected XSS.mp4

43.0 MB

3. Reflected XSS.srt

3.6 KB

4. StoredDOM XSS.mp4

44.5 MB

4. StoredDOM XSS.srt

3.6 KB

5. XSS Demonstration.mp4

105.9 MB

5. XSS Demonstration.srt

6.9 KB

6. Session Hijacking.mp4

50.0 MB

6. Session Hijacking.srt

4.1 KB

7. Session Fixation.mp4

58.2 MB

7. Session Fixation.srt

5.1 KB

8. Practical Putting the Attack in XSS Attack.mp4

57.8 MB

8. Practical Putting the Attack in XSS Attack.srt

4.0 KB

/.../16. More Web Attacks/

1. Local File Inclusion.mp4

69.1 MB

1. Local File Inclusion.srt

4.6 KB

2. Remote File Inclusion.mp4

122.5 MB

2. Remote File Inclusion.srt

9.6 KB

3. HTML Injection.mp4

53.3 MB

3. HTML Injection.srt

3.8 KB

4. Taking HTML Injection Further.mp4

76.5 MB

4. Taking HTML Injection Further.srt

5.7 KB

5. OS Command Injection.mp4

109.1 MB

5. OS Command Injection.srt

8.5 KB

6. Automating OS Command Injection.mp4

40.5 MB

6. Automating OS Command Injection.srt

3.3 KB

7. Cross-Site Request Forgery.mp4

80.9 MB

7. Cross-Site Request Forgery.srt

6.5 KB

8. Direct Object Reference.mp4

65.6 MB

8. Direct Object Reference.srt

4.8 KB

/.../17. Buffer Overflow/

1. Introduction.mp4

78.3 MB

1. Introduction.srt

6.5 KB

2. Immunity Debugger.mp4

46.3 MB

2. Immunity Debugger.srt

3.5 KB

3. EIP Register.mp4

13.5 MB

3. EIP Register.srt

1.1 KB

4. EIP Hunting.mp4

56.5 MB

4. EIP Hunting.srt

3.5 KB

5. Controlling the EIP.mp4

50.1 MB

5. Controlling the EIP.srt

3.8 KB

6. ESP Register.mp4

18.2 MB

6. ESP Register.srt

1.5 KB

7. Shellcode Sizing.mp4

38.6 MB

7. Shellcode Sizing.srt

3.2 KB

8. Another road to ESP.mp4

35.5 MB

8. Another road to ESP.srt

3.0 KB

9. The Mona Script.mp4

22.4 MB

9. The Mona Script.srt

1.3 KB

10. Mona Modules.mp4

44.2 MB

10. Mona Modules.srt

2.7 KB

11. Breakpoint Confirmation.mp4

45.0 MB

11. Breakpoint Confirmation.srt

3.4 KB

12. Bad Characters.mp4

83.4 MB

12. Bad Characters.srt

5.8 KB

13. Shellcode Generation.mp4

53.8 MB

13. Shellcode Generation.srt

4.1 KB

14. BOF Exploitation.mp4

40.3 MB

14. BOF Exploitation.srt

2.8 KB

/.../18. Denial of Service/

1. Introduction.mp4

50.2 MB

1. Introduction.srt

4.1 KB

2. Slowloris & RUDY.mp4

29.2 MB

2. Slowloris & RUDY.srt

2.5 KB

3. Slow Read, SYN Flood & Nuke.mp4

46.6 MB

3. Slow Read, SYN Flood & Nuke.srt

3.6 KB

4. ICMP Flood, Shrew, Phlashing, LOIC & HOIC.mp4

57.8 MB

4. ICMP Flood, Shrew, Phlashing, LOIC & HOIC.srt

4.4 KB

/.../19. Password Cracking/

1. Introduction.mp4

45.1 MB

1. Introduction.srt

3.8 KB

2. Hashes & Salts.mp4

33.1 MB

2. Hashes & Salts.srt

2.8 KB

3. Windows Hashes.mp4

81.1 MB

3. Windows Hashes.srt

5.7 KB

4. Linux Hashes.mp4

56.2 MB

4. Linux Hashes.srt

3.9 KB

5. Rainbowtable, Dictionary & Hybrid Attacks.mp4

77.2 MB

5. Rainbowtable, Dictionary & Hybrid Attacks.srt

6.1 KB

6. Introduction to John-the-Ripper.mp4

18.5 MB

6. Introduction to John-the-Ripper.srt

1.2 KB

7. Introducing Hashcat.mp4

49.9 MB

7. Introducing Hashcat.srt

4.0 KB

8. Hashcat Rules.mp4

60.8 MB

8. Hashcat Rules.srt

4.7 KB

/20. Bruteforcing/

1. Hydra.mp4

33.9 MB

1. Hydra.srt

2.8 KB

/21. Phishing/

1. Introduction.mp4

75.4 MB

1. Introduction.srt

5.3 KB

2. Spear Phishing.mp4

6.3 MB

2. Spear Phishing.srt

0.5 KB

3. Greed.mp4

11.9 MB

3. Greed.srt

0.9 KB

4. Curiosity.mp4

11.3 MB

4. Curiosity.srt

1.0 KB

5. Urgency.mp4

16.9 MB

5. Urgency.srt

1.6 KB

6. Authority.mp4

25.0 MB

6. Authority.srt

2.0 KB

/.../22. Linux Privilege Escalation/

1. Introduction.mp4

17.1 MB

1. Introduction.srt

1.4 KB

2. Restrictive Shell Breakout.mp4

29.9 MB

2. Restrictive Shell Breakout.srt

2.4 KB

3. Further Restrictive Shell Escaping.mp4

16.5 MB

3. Further Restrictive Shell Escaping.srt

1.3 KB

4. Enumeration.mp4

23.7 MB

4. Enumeration.srt

2.0 KB

5. Kernel Exploitation.mp4

87.6 MB

5. Kernel Exploitation.srt

6.6 KB

6. Root Processes.mp4

121.2 MB

6. Root Processes.srt

8.0 KB

7. Mining Credentials.mp4

47.8 MB

7. Mining Credentials.srt

3.5 KB

8. Cronjob.mp4

67.6 MB

8. Cronjob.srt

5.2 KB

9. SUID Exploitation.mp4

55.4 MB

9. SUID Exploitation.srt

4.0 KB

10. Summary.mp4

19.1 MB

10. Summary.srt

1.4 KB

/.../23. Windows Privilege Escalation/

1. Introduction.mp4

22.1 MB

1. Introduction.srt

1.8 KB

2. Kernel Exploitation.mp4

155.8 MB

2. Kernel Exploitation.srt

12.6 KB

3. Windows Services Introduction.mp4

57.4 MB

3. Windows Services Introduction.srt

4.9 KB

4. Modifying Windows Services.mp4

90.3 MB

4. Modifying Windows Services.srt

7.0 KB

5. Abusing File Permissions.mp4

114.7 MB

5. Abusing File Permissions.srt

6.8 KB

6. Unquoted Service Paths.mp4

125.2 MB

6. Unquoted Service Paths.srt

7.8 KB

7. Registry Keys.mp4

26.8 MB

7. Registry Keys.srt

2.1 KB

8. Registry Passwords.mp4

76.5 MB

8. Registry Passwords.srt

5.5 KB

9. Elevated Install.mp4

60.5 MB

9. Elevated Install.srt

4.1 KB

10. Mining Credentials.mp4

57.7 MB

10. Mining Credentials.srt

4.2 KB

11. Summary.mp4

8.3 MB

11. Summary.srt

0.6 KB

/.../24. Beyond This Course/

1. Where To From Here.mp4

41.6 MB

1. Where To From Here.srt

3.7 KB

/.../1. Introduction & Setting Up Our Hacking Lab/

1. Learn Ethical Hacking Skills & Cyber Security Skills With Us Today!.mp4

37.5 MB

1. Learn Ethical Hacking Skills & Cyber Security Skills With Us Today!.vtt

2.2 KB

2. Welcome To The Complete Ethical Hacking and Cyber Security Master Class.mp4

22.4 MB

2. Welcome To The Complete Ethical Hacking and Cyber Security Master Class.vtt

1.7 KB

3. Course Introduction & What You Will Learn.mp4

84.1 MB

3. Course Introduction & What You Will Learn.vtt

7.0 KB

4. Course Trailer 2 Types of Attacks.mp4

72.9 MB

4. Course Trailer 2 Types of Attacks.vtt

8.3 KB

5. Virtual Box 6.0 Installation.mp4

40.7 MB

5. Virtual Box 6.0 Installation.vtt

7.3 KB

6. Installing Kali Linux As Operating System For Hacking.mp4

72.7 MB

6. Installing Kali Linux As Operating System For Hacking.vtt

19.5 KB

7. Going Full Screen On Kali Linux!.mp4

44.1 MB

7. Going Full Screen On Kali Linux!.vtt

7.5 KB

/2. Linux Basics/

1. Linux Enviroment.mp4

96.4 MB

1. Linux Enviroment.vtt

9.2 KB

2. Terminal Commands Part 1.mp4

140.0 MB

2. Terminal Commands Part 1.vtt

14.4 KB

3. Terminal Commands Part 2.mp4

111.6 MB

3. Terminal Commands Part 2.vtt

11.0 KB

4. Configuring IP Address And Network Settings.mp4

70.7 MB

4. Configuring IP Address And Network Settings.vtt

8.4 KB

5. Cat, Echo, Apt-get ....mp4

124.4 MB

5. Cat, Echo, Apt-get ....vtt

14.5 KB

/.../3. Information Gathering & Footprinting/

1. Five Phases Of A Penetration Test.mp4

84.8 MB

1. Five Phases Of A Penetration Test.vtt

9.0 KB

2. Active & Passive Footprinting Theory.mp4

23.2 MB

2. Active & Passive Footprinting Theory.vtt

6.2 KB

3. Finding Target Emails With Harvester.mp4

121.4 MB

3. Finding Target Emails With Harvester.vtt

15.7 KB

4. Gathering Valuable Information With Dnsdumpster & OSINT.mp4

70.8 MB

4. Gathering Valuable Information With Dnsdumpster & OSINT.vtt

10.9 KB

5. Network Scanning Terminology And Theory.mp4

66.6 MB

5. Network Scanning Terminology And Theory.vtt

16.3 KB

6. Ping & Traceroute.mp4

64.5 MB

6. Ping & Traceroute.vtt

8.8 KB

7. Bettercap & Netdiscover.mp4

61.9 MB

7. Bettercap & Netdiscover.vtt

8.5 KB

/.../4. Evading Firewall & IDS & Honeypots Using Advance Scanning/

1. Performing Default Nmap Scan.mp4

81.0 MB

1. Performing Default Nmap Scan.vtt

6.0 KB

2. What is IDS & IPS, Honeypot And Firewall .mp4

10.6 MB

2. What is IDS & IPS, Honeypot And Firewall .vtt

5.3 KB

3. Evading Firewall with Nmap.mp4

122.4 MB

3. Evading Firewall with Nmap.vtt

13.4 KB

4. Bypassing IDS & IPS.mp4

64.8 MB

4. Bypassing IDS & IPS.vtt

5.0 KB

5. Creating Decoys during scan with Fragmented Packets.mp4

159.0 MB

5. Creating Decoys during scan with Fragmented Packets.vtt

15.1 KB

6. Discovering Service Version on an Open Port.mp4

236.2 MB

6. Discovering Service Version on an Open Port.vtt

20.3 KB

/5. Vulnerability Analysis/

1. Searchsploit & Shodan.mp4

172.9 MB

1. Searchsploit & Shodan.vtt

20.6 KB

/.../6. Gaining Access To a Network - WPA2WPA Cracking/

1. Wireless Hacking Theory.mp4

111.0 MB

1. Wireless Hacking Theory.vtt

12.7 KB

2. Putting Our Wireless Card Into Monitor Mode.mp4

51.7 MB

2. Putting Our Wireless Card Into Monitor Mode.vtt

5.9 KB

3. Sniffing Network Information In Monitor Mode.mp4

69.4 MB

4. Deauthenticating Everyone On The Network And Capturing 4 Way Handshake.mp4

53.5 MB

4. Deauthenticating Everyone On The Network And Capturing 4 Way Handshake.vtt

7.8 KB

5. Cracking The Password Hash With Aircrack-ng.mp4

119.7 MB

5. Cracking The Password Hash With Aircrack-ng.vtt

11.8 KB

6. Cracking The Password Faster Using Hashcat.mp4

162.7 MB

6. Cracking The Password Faster Using Hashcat.vtt

18.8 KB

/.../7. Gaining Access - Evil Twin Attack/

1. Creating Fake Access Point With Airgedon.mp4

130.6 MB

1. Creating Fake Access Point With Airgedon.vtt

19.4 KB

2. Capturing Wireless Password With Fake Access Point.mp4

77.5 MB

2. Capturing Wireless Password With Fake Access Point.vtt

10.1 KB

/.../8. Man In The Middle - Steal Everyones Data/

1. Theory Of Arp Spoofing.mp4

29.1 MB

1. Theory Of Arp Spoofing.vtt

7.8 KB

2. MITMf Full Installation.mp4

53.6 MB

2. MITMf Full Installation.vtt

6.1 KB

3. Performing An ARP Spoof Attack.mp4

119.4 MB

3. Performing An ARP Spoof Attack.vtt

11.6 KB

4. Redirecting To A Fake Captive Portal.mp4

209.3 MB

4. Redirecting To A Fake Captive Portal.vtt

19.4 KB

5. Sniffing Passwords & Flipping Images On Targets Browser.mp4

126.6 MB

5. Sniffing Passwords & Flipping Images On Targets Browser.vtt

11.6 KB

/.../9. Gaining Access To A Machine - System Hacking/

1. System Hacking Theory.mp4

78.2 MB

1. System Hacking Theory.vtt

10.0 KB

2. Metasploit Framework Structure.mp4

194.1 MB

2. Metasploit Framework Structure.vtt

19.6 KB

3. Exploiting Windows With Eternalblue Attack.mp4

146.7 MB

3. Exploiting Windows With Eternalblue Attack.vtt

15.9 KB

4. Running Doublepulsar Attack.mp4

246.4 MB

4. Running Doublepulsar Attack.vtt

20.8 KB

5. Using Evasion Modules To Bypass Windows Defender.mp4

100.1 MB

5. Using Evasion Modules To Bypass Windows Defender.vtt

9.4 KB

6. Using Msfvenom To Generate A Trojan & Windows 10 Hacking.mp4

224.7 MB

6. Using Msfvenom To Generate A Trojan & Windows 10 Hacking.vtt

23.3 KB

7. Bypassing Antivirus Using Encoders And Bad Bytes.mp4

124.9 MB

7. Bypassing Antivirus Using Encoders And Bad Bytes.vtt

13.7 KB

8. Changing Executable Binary With Hexeditor.mp4

116.8 MB

8. Changing Executable Binary With Hexeditor.vtt

13.2 KB

9. Hack Any Machine Over Internet Using Port Forwarding.mp4

110.8 MB

9. Hack Any Machine Over Internet Using Port Forwarding.vtt

11.9 KB

/.../10. Coding Project 1 Reverse Shell In Python/

1. Creating Server & Payload.mp4

238.6 MB

1. Creating Server & Payload.vtt

23.1 KB

2. Converting Python File To Exe.mp4

117.4 MB

2. Converting Python File To Exe.vtt

11.2 KB

/.../11. Post Exploitation - Stealing Valuable Information/

1. Meterpreter Commands Part 1.mp4

249.9 MB

1. Meterpreter Commands Part 1.vtt

21.3 KB

2. Meterpreter Commands Part 2.mp4

229.8 MB

2. Meterpreter Commands Part 2.vtt

20.1 KB

3. Creating Persistence On Target PC & Registry Edit.mp4

157.2 MB

3. Creating Persistence On Target PC & Registry Edit.vtt

13.6 KB

4. Discovering Other Machines On A Target Network.mp4

111.5 MB

4. Discovering Other Machines On A Target Network.vtt

9.8 KB

5. Bypassing UAC & Gaining Privileges.mp4

141.4 MB

5. Bypassing UAC & Gaining Privileges.vtt

9.7 KB

6. Stealing Targets Chrome and WLAN Passwords After Exploit.mp4

103.9 MB

6. Stealing Targets Chrome and WLAN Passwords After Exploit.vtt

9.1 KB

7. Embedding A Backdoor Into An Image.mp4

31.4 MB

7. Embedding A Backdoor Into An Image.vtt

6.2 KB

/.../12. Web Application Penetration Testing - Injections, Bruteforcers, Packet Sniffers/

1. OWASP Installation - Vulnerable Web Application.mp4

50.0 MB

1. OWASP Installation - Vulnerable Web Application.vtt

9.8 KB

2. DIRB & Whatweb For Website Identification.mp4

153.2 MB

2. DIRB & Whatweb For Website Identification.vtt

10.9 KB

3. Hydra - Bruteforcing Any Login Page.mp4

191.3 MB

3. Hydra - Bruteforcing Any Login Page.vtt

16.5 KB

4. Burpsuite Introduction & Configuration.mp4

128.7 MB

4. Burpsuite Introduction & Configuration.vtt

15.8 KB

5. Command Injection & Target Exploitation.mp4

223.2 MB

5. Command Injection & Target Exploitation.vtt

17.7 KB

6. Combining Our Python Tool With Command Injection Vulnerability.mp4

106.8 MB

6. Combining Our Python Tool With Command Injection Vulnerability.vtt

11.3 KB

7. XSS Attack Theory.mp4

24.1 MB

7. XSS Attack Theory.vtt

6.6 KB

8. Finding XSS Vulnerability On A Webpage.mp4

33.5 MB

8. Finding XSS Vulnerability On A Webpage.vtt

7.2 KB

9. Solving XSS Challenges On An Online Lab.mp4

47.7 MB

9. Solving XSS Challenges On An Online Lab.vtt

9.7 KB

10. HTML Character Encoding To Exploit an XSS Vulnerability.mp4

32.6 MB

10. HTML Character Encoding To Exploit an XSS Vulnerability.vtt

8.6 KB

11. HTML Code Injection Vulnerability.mp4

40.7 MB

11. HTML Code Injection Vulnerability.vtt

5.1 KB

12. What is SQL & SQL Injection Theory.mp4

91.9 MB

12. What is SQL & SQL Injection Theory.vtt

16.5 KB

13. Stealing Database Passwords With Advance Manual SQL Injection.mp4

146.4 MB

13. Stealing Database Passwords With Advance Manual SQL Injection.vtt

27.5 KB

/.../13. Coding Project 2 Making Bruteforcer In Python/

1. Coding Login Form Bruteforcer Using Python.mp4

277.3 MB

1. Coding Login Form Bruteforcer Using Python.vtt

19.4 KB

/.../14. Creating Undetectable Malware Using C Language/

1. Describing What We Are Going To Code.mp4

140.3 MB

1. Describing What We Are Going To Code.vtt

11.6 KB

2. Using Struct sockaddr_in To Setup Socket Object.mp4

222.9 MB

2. Using Struct sockaddr_in To Setup Socket Object.vtt

16.2 KB

3. Binding And Accepting Target Connection In a Server.mp4

102.2 MB

3. Binding And Accepting Target Connection In a Server.vtt

9.3 KB

4. Sending Command To Target To Execute.mp4

280.3 MB

4. Sending Command To Target To Execute.vtt

22.6 KB

5. Starting With The Malware & Defining Bzero Function.mp4

130.2 MB

5. Starting With The Malware & Defining Bzero Function.vtt

10.1 KB

6. Creating APIENTRY Function And Hiding Program Console.mp4

220.1 MB

6. Creating APIENTRY Function And Hiding Program Console.vtt

15.0 KB

7. Executing Commands On Target System.mp4

218.0 MB

7. Executing Commands On Target System.vtt

14.7 KB

8. First Test Of Our Malware.mp4

175.1 MB

8. First Test Of Our Malware.vtt

13.8 KB

9. Making Our Malware Look Like An Error.mp4

199.9 MB

9. Making Our Malware Look Like An Error.vtt

19.8 KB

/.../15. Course Summary and Conclusion/

1. Course Bonus Video!.mp4

18.7 MB

1. Course Bonus Video!.vtt

1.2 KB

/1. Introduction/

1. Introduction.mp4

454.4 MB

1. Introduction.srt

35.9 KB

2. Basic Concepts of Networking.mp4

388.2 MB

2. Basic Concepts of Networking.srt

32.9 KB

3. Basic Concepts of Networking part2.mp4

374.0 MB

3. Basic Concepts of Networking part2.srt

31.0 KB

4. TCPIP Protocol Stack part1.mp4

395.4 MB

4. TCPIP Protocol Stack part1.srt

32.2 KB

5. TCPIP Protocol stack part2.mp4

349.5 MB

5. TCPIP Protocol stack part2.srt

27.7 KB

/2. Week 2/

1. IP adressing and routing part1.mp4

407.3 MB

1. IP adressing and routing part1.srt

34.2 KB

2. IP adressing and routing part 2.mp4

281.9 MB

2. IP adressing and routing part 2.srt

20.9 KB

3. TCP and UDP part 1.mp4

406.6 MB

3. TCP and UDP part 1.srt

30.7 KB

4. TCP and UDP part 2.mp4

402.3 MB

4. TCP and UDP part 2.srt

29.7 KB

5. IP subnetting.mp4

377.1 MB

5. IP subnetting.srt

25.3 KB

/3. Week 3/

1. Routing Protocols part 1.mp4

407.9 MB

1. Routing Protocols part 1.srt

0.0 KB

2. Routing Protocolos part 2.mp4

365.6 MB

2. Routing Protocolos part 2.srt

0.0 KB

3. Routing Protocols part 3.mp4

323.9 MB

3. Routing Protocols part 3.srt

26.2 KB

4. IP version 6.mp4

509.4 MB

4. IP version 6.srt

39.8 KB

5. Routing examples.mp4

412.5 MB

5. Routing examples.srt

34.2 KB

/4. Week 4/

1. Demonstration part 1.mp4

94.3 MB

1. Demonstration part 1.srt

8.5 KB

2. Demonstration part 2.mp4

145.1 MB

2. Demonstration part 2.srt

15.2 KB

3. Demonstration part 3.mp4

189.4 MB

3. Demonstration part 3.srt

19.7 KB

4. Nessus Installation.mp4

66.7 MB

4. Nessus Installation.srt

3.6 KB

5. How to use nessus.mp4

51.7 MB

5. How to use nessus.srt

8.0 KB

/5. Week 5/

1. Metasploit Exploiting System Software part 1.mp4

196.4 MB

1. Metasploit Exploiting System Software part 1.srt

16.0 KB

2. Metasploit Exploiting System Software part 2.mp4

79.3 MB

2. Metasploit Exploiting System Software part 2.srt

7.2 KB

3. Metasploit Exploiting System Software a privilege.mp4

88.6 MB

3. Metasploit Exploiting System Software a privilege.srt

8.7 KB

4. Metasploit Social Eng attack.mp4

119.2 MB

4. Metasploit Social Eng attack.srt

8.5 KB

/6. Week 6/

1. Basic Concepts of Cryptography.mp4

378.3 MB

1. Basic Concepts of Cryptography.srt

32.2 KB

2. Private key cryptography part 1.mp4

328.5 MB

2. Private key cryptography part 1.srt

27.7 KB

3. Private key cryptography part 2.mp4

283.3 MB

3. Private key cryptography part 2.srt

23.5 KB

4. Public key cryptography part 1.mp4

442.3 MB

4. Public key cryptography part 1.srt

35.4 KB

5. Public key cryptography part 2.mp4

247.1 MB

5. Public key cryptography part 2.srt

19.4 KB

/7. Week 7/

1. Cryptographic hash functions.mp4

234.0 MB

1. Cryptographic hash functions.srt

21.1 KB

2. Cryptographic hash functions part 2.mp4

337.2 MB

2. Cryptographic hash functions part 2.srt

29.4 KB

3. Digital Signature and certificate.mp4

375.3 MB

3. Digital Signature and certificate.srt

33.2 KB

4. Applications.mp4

332.5 MB

4. Applications.srt

28.5 KB

5. Applications part 2.mp4

324.9 MB

5. Applications part 2.srt

31.3 KB

/8. Week 8/

1. Steganography.mp4

370.7 MB

1. Steganography.srt

30.5 KB

2. Biometrics.mp4

249.1 MB

2. Biometrics.srt

22.4 KB

3. Network Based attacks.mp4

341.5 MB

3. Network Based attacks.srt

28.4 KB

4. Network based attacks part 2.mp4

339.2 MB

4. Network based attacks part 2.srt

30.2 KB

5. DNS and Email security.mp4

414.6 MB

5. DNS and Email security.srt

33.7 KB

/.../10. Week 10/

1. Elements of Hardware security.mp4

270.4 MB

1. Elements of Hardware security.srt

27.9 KB

2. Side channel attacks.mp4

300.5 MB

2. Side channel attacks.srt

30.6 KB

3. Side channel attacks part 2.mp4

183.3 MB

3. Side channel attacks part 2.srt

18.5 KB

4. Physical Unconable Function.mp4

386.4 MB

4. Physical Unconable Function.srt

33.6 KB

/.../11. Week 11/

1. SQL Injction Authentication bypass.mp4

85.8 MB

1. SQL Injction Authentication bypass.srt

14.3 KB

2. SQL Injection error based.mp4

39.6 MB

2. SQL Injection error based.srt

6.5 KB

3. SQL injection error based from web application.mp4

39.5 MB

3. SQL injection error based from web application.srt

6.5 KB

4. SQL Map.mp4

70.2 MB

4. SQL Map.srt

5.6 KB

5. File Upload Vulnerability.mp4

76.5 MB

5. File Upload Vulnerability.srt

8.5 KB

/.../12. Week 12/

1. The NmAP Tool a relook.mp4

434.9 MB

1. The NmAP Tool a relook.srt

38.8 KB

2. ccthe NMAP tool part 2.mp4

352.4 MB

2. ccthe NMAP tool part 2.srt

30.4 KB

3. The NMAP tool part 3.mp4

399.2 MB

3. The NMAP tool part 3.srt

33.5 KB

4. Network Analysis using wineshark.mp4

525.2 MB

4. Network Analysis using wineshark.srt

46.1 KB

5. Summarization of the Course.mp4

193.8 MB

5. Summarization of the Course.srt

15.8 KB

/1. Chapter 1/

1. Disclaimer.mp4

2.7 MB

1. Disclaimer.srt

0.9 KB

2. How to take this course.mp4

11.6 MB

2. How to take this course.srt

1.9 KB

3. Make Kali Linux Bootable.mp4

48.1 MB

3. Make Kali Linux Bootable.srt

3.1 KB

4. Set up Kali Linux in Vmware.mp4

48.0 MB

4. Set up Kali Linux in Vmware.srt

3.1 KB

5. Kali Linux Latest Version.mp4

22.1 MB

5. Kali Linux Latest Version.srt

4.3 KB

/2. Keylogger/

1. Setting Up.mp4

19.2 MB

1. Setting Up.srt

2.5 KB

2. Introduction.mp4

3.4 MB

2. Introduction.srt

0.5 KB

3. Process.mp4

9.8 MB

3. Process.srt

4.0 KB

4. Software for keylogger.mp4

9.3 MB

4. Software for keylogger.srt

1.9 KB

5. Whatsapp hacking.mp4

13.4 MB

5. Whatsapp hacking.srt

3.2 KB

6. Whatsapp hacking hands on.mp4

34.7 MB

6. Whatsapp hacking hands on.srt

9.6 KB

7. Whatsapp hacking hands on - result.mp4

6.6 MB

7. Whatsapp hacking hands on - result.srt

1.4 KB

8. Whatsapp hacking hands on - cancel subscription.mp4

9.7 MB

8. Whatsapp hacking hands on - cancel subscription.srt

2.0 KB

9. Rooting android device to install mspy app.mp4

13.6 MB

9. Rooting android device to install mspy app.srt

2.4 KB

10. Whatsapp hacking hands on.html

0.1 KB

11. Counter measures for keylogger.mp4

2.7 MB

11. Counter measures for keylogger.srt

1.7 KB

12. Finding keylogger in Android.mp4

12.4 MB

12. Finding keylogger in Android.srt

2.7 KB

13. Finding keylogger in MAC OS.mp4

16.1 MB

13. Finding keylogger in MAC OS.srt

1.8 KB

/3. Guessing/

1. Introduction.mp4

2.3 MB

1. Introduction.srt

0.5 KB

2. Guessing password.mp4

13.9 MB

2. Guessing password.srt

2.3 KB

3. Software for brute force.mp4

25.3 MB

3. Software for brute force.srt

2.2 KB

4. Introduction to Kali Linux.mp4

22.4 MB

4. Introduction to Kali Linux.srt

6.3 KB

5. Brute force with help of guessing.mp4

16.3 MB

5. Brute force with help of guessing.srt

1.7 KB

6. Counter measures for guessing.mp4

4.8 MB

6. Counter measures for guessing.srt

1.3 KB

7. Guessing.html

0.1 KB

/4. Brute force/

1. Introduction.mp4

4.1 MB

1. Introduction.srt

0.4 KB

2. what you need for brute force.mp4

25.3 MB

2. what you need for brute force.srt

2.2 KB

3. Why not to use virtual box.mp4

9.7 MB

3. Why not to use virtual box.srt

2.2 KB

4. Wifi password hacking through brute force.mp4

26.2 MB

4. Wifi password hacking through brute force.srt

2.8 KB

5. Wifi password hacking through brute force in depth with explanation.mp4

19.1 MB

5. Wifi password hacking through brute force in depth with explanation.srt

7.3 KB

6. Breaking a WPS PIN to Get the Password with Bully.mp4

38.3 MB

6. Breaking a WPS PIN to Get the Password with Bully.srt

5.7 KB

7. Hacking through brute force and guessing.mp4

16.3 MB

7. Hacking through brute force and guessing.srt

1.7 KB

8. Setting up kali linux in virtual box.mp4

28.7 MB

8. Setting up kali linux in virtual box.srt

7.1 KB

9. Setting up DVWA -1.mp4

17.2 MB

9. Setting up DVWA -1.srt

3.3 KB

10. Setting up DVWA-2.mp4

25.2 MB

10. Setting up DVWA-2.srt

4.6 KB

11. Introduction to Hydra.mp4

18.2 MB

11. Introduction to Hydra.srt

2.8 KB

12. Hydra collecting information.mp4

61.4 MB

12. Hydra collecting information.srt

13.3 KB

13. Using hydra to brute force.mp4

19.4 MB

13. Using hydra to brute force.srt

4.5 KB

14. List of password.mp4

6.4 MB

14. List of password.srt

2.5 KB

15. Brute force WiFi using smart phone.mp4

5.6 MB

15. Brute force WiFi using smart phone.srt

2.9 KB

16. L0pht crack download and install.mp4

24.0 MB

16. L0pht crack download and install.srt

3.8 KB

17. L0pht crack wizard.mp4

45.9 MB

17. L0pht crack wizard.srt

10.3 KB

18. Cracking Wifi WPAWPA2 passwords using pyrit cowpatty.mp4

23.9 MB

18. Cracking Wifi WPAWPA2 passwords using pyrit cowpatty.srt

3.5 KB

19. Crunch Password Generating Tool(Ethical Password hacking and protecting).mp4

26.0 MB

19. Crunch Password Generating Tool(Ethical Password hacking and protecting).srt

3.1 KB

20. Hydra - Online password attacks - Kali Linux.mp4

35.1 MB

20. Hydra - Online password attacks - Kali Linux.srt

3.6 KB

21. john the ripper.mp4

25.7 MB

21. john the ripper.srt

2.8 KB

22. WPA2 Password Crack - Gerix Wifi Cracker(Ethical Password hacking and protectng).mp4

34.4 MB

22. WPA2 Password Crack - Gerix Wifi Cracker(Ethical Password hacking and protectng).srt

3.8 KB

23. hostapd-wpe.mp4

25.5 MB

23. hostapd-wpe.srt

3.4 KB

24. Counter measures for brute force.mp4

18.3 MB

24. Counter measures for brute force.srt

3.1 KB

25. Brute force.html

0.1 KB

/5. Phishing/

1. Introduction.mp4

3.3 MB

1. Introduction.srt

0.5 KB

2. What you need for phishing.mp4

25.3 MB

2. What you need for phishing.srt

2.2 KB

3. Password hacking through phishing.mp4

39.9 MB

3. Password hacking through phishing.srt

4.0 KB

4. Things to keep in mind while cloning login page.mp4

12.4 MB

4. Things to keep in mind while cloning login page.srt

2.8 KB

5. login page of any website can be cloned.mp4

7.3 MB

5. login page of any website can be cloned.srt

1.8 KB

6. Using domain name for phishing -12.mp4

10.1 MB

6. Using domain name for phishing -12.srt

3.3 KB

7. Using domain name for phishing-22.mp4

4.6 MB

7. Using domain name for phishing-22.srt

1.3 KB

8. Developing facebook phishing page(optional but recommended way).mp4

18.0 MB

8. Developing facebook phishing page(optional but recommended way).srt

3.9 KB

9. Hosting Facebook phishing page.mp4

16.5 MB

9. Hosting Facebook phishing page.srt

3.5 KB

10. Phishing page in depth with explanation.mp4

8.8 MB

10. Phishing page in depth with explanation.srt

2.9 KB

11. Attaching phishing page to domain.mp4

13.7 MB

11. Attaching phishing page to domain.srt

2.8 KB

12. Using Google AdWords for phishing -110- Plan.mp4

8.1 MB

12. Using Google AdWords for phishing -110- Plan.srt

1.7 KB

13. Using Google AdWords for phishing -210 - Setting up AdWord account.mp4

9.5 MB

13. Using Google AdWords for phishing -210 - Setting up AdWord account.srt

2.8 KB

14. Using Google AdWords for phishing -310- AdWord account in brief.mp4

12.6 MB

14. Using Google AdWords for phishing -310- AdWord account in brief.srt

2.7 KB

15. Using Google AdWords for phishing -410- Keyword.mp4

8.8 MB

15. Using Google AdWords for phishing -410- Keyword.srt

1.6 KB

16. Using Google AdWords for phishing -510- Keyword match.mp4

8.5 MB

16. Using Google AdWords for phishing -510- Keyword match.srt

2.6 KB

17. Using Google AdWords for phishing -610- Keyword planner.mp4

12.4 MB

17. Using Google AdWords for phishing -610- Keyword planner.srt

2.8 KB

18. Using Google AdWords for phishing -710- Creating campaign.mp4

22.7 MB

18. Using Google AdWords for phishing -710- Creating campaign.srt

4.4 KB

19. Using Google AdWords for phishing -810- Results.mp4

9.0 MB

19. Using Google AdWords for phishing -810- Results.srt

1.8 KB

20. Using Google AdWords for phishing-910 -Budget.mp4

9.0 MB

20. Using Google AdWords for phishing-910 -Budget.srt

3.8 KB

21. Using Google AdWords for phishing -1010- Summary.mp4

6.9 MB

21. Using Google AdWords for phishing -1010- Summary.srt

4.4 KB

22. Phishing through email in depth- custom email.mp4

29.0 MB

22. Phishing through email in depth- custom email.srt

7.3 KB

23. Counter measures for phishing.mp4

7.0 MB

23. Counter measures for phishing.srt

0.9 KB

24. Phishing.html

0.1 KB

/6. Social Engineering/

1. Introduction.mp4

4.1 MB

1. Introduction.srt

1.0 KB

2. Social engineering through human method.mp4

41.5 MB

2. Social engineering through human method.srt

8.1 KB

3. Social engineering through computer method.mp4

46.3 MB

3. Social engineering through computer method.srt

6.7 KB

4. Get all Passwords of a Computer - laZagne.mp4

13.3 MB

4. Get all Passwords of a Computer - laZagne.srt

1.4 KB

5. Counter measures for social engineering engineering.mp4

13.2 MB

5. Counter measures for social engineering engineering.srt

2.0 KB

/7. Miscellaneous/

1. SQL Injection.mp4

65.1 MB

1. SQL Injection.srt

8.5 KB

2. Hack Windows 7 with Metasploit using Kali Linux.mp4

26.0 MB

2. Hack Windows 7 with Metasploit using Kali Linux.srt

7.0 KB

3. Password Sniffing - Metasploit.mp4

17.5 MB

3. Password Sniffing - Metasploit.srt

2.0 KB

4. Getting All saved Passwords of Linux - LaZagne.mp4

17.4 MB

4. Getting All saved Passwords of Linux - LaZagne.srt

2.0 KB

5. Wireshark Installation.mp4

10.5 MB

5. Wireshark Installation.srt

1.9 KB

6. How to get router password using wireshark.mp4

15.0 MB

6. How to get router password using wireshark.srt

1.7 KB

7. Sniffing Passwords Using Wireshark.mp4

22.4 MB

7. Sniffing Passwords Using Wireshark.srt

2.8 KB

8. password sniffing - Ettercap.mp4

12.2 MB

8. password sniffing - Ettercap.srt

2.2 KB

9. How to get router password.mp4

14.9 MB

9. How to get router password.srt

1.7 KB

10. Password Hacking using USB.mp4

18.1 MB

10. Password Hacking using USB.srt

2.2 KB

11. Accessing file inside password protected windows system.mp4

6.3 MB

11. Accessing file inside password protected windows system.srt

1.9 KB

12. crack into password protected windows 7 system.mp4

23.0 MB

12. crack into password protected windows 7 system.srt

4.1 KB

13. Crack User Password in a Linux System.mp4

16.2 MB

13. Crack User Password in a Linux System.srt

4.5 KB

14. Hacking password through browser.mp4

7.3 MB

14. Hacking password through browser.srt

1.7 KB

15. Pass Phrase.mp4

38.0 MB

15. Pass Phrase.srt

13.3 KB

16. How to create stronger passwords.mp4

9.0 MB

16. How to create stronger passwords.srt

5.8 KB

17. Facts on password hacking.mp4

28.4 MB

17. Facts on password hacking.srt

5.7 KB

18. Facts on password hacking.html

0.1 KB

/.../8. Popular Password Cracking Tools/

1. Ethical Password hacking and protecting Last lecture.mp4

11.8 MB

1. Ethical Password hacking and protecting Last lecture.srt

5.4 KB

2. QUIZ.html

0.1 KB

/9. Bonus Lecture/

1. Bonus Lecture.html

12.4 KB

/1. Let's start!/

1. Welcome to the course.html

0.3 KB

2. Foreword & FAQ.html

2.6 KB

3. Course preview 15 min. long demo lecture. The whole training is 27 hours long..mp4

223.9 MB

3. Course preview 15 min. long demo lecture. The whole training is 27 hours long..srt

25.7 KB

/2. Application Security/

1. Why is this section here.html

0.4 KB

2. Introduction to Application Security.mp4

22.3 MB

2. Introduction to Application Security.srt

9.2 KB

3. Attacks on applications.mp4

26.7 MB

3. Attacks on applications.srt

12.0 KB

4. SQL Injection.mp4

18.8 MB

4. SQL Injection.srt

9.4 KB

4.1 Kali Linux Download - your training environment.html

0.1 KB

5. EXERCISE Analyze the application.mp4

30.1 MB

5. EXERCISE Analyze the application.srt

16.1 KB

6. Blind SQL Injection.mp4

23.6 MB

6. Blind SQL Injection.srt

11.3 KB

7. Automated SQL Injection.mp4

30.9 MB

7. Automated SQL Injection.srt

14.0 KB

8. Cross-site scripting - XSS.mp4

30.5 MB

8. Cross-site scripting - XSS.srt

11.4 KB

9. Application Attacks - notes for the examination.html

0.0 KB

9.1 13-1-CISS-Ethical-Hacking-Training-2.0-by-www.SecAcademy.com.pdf.pdf

1.7 MB

10. Program security assessment.mp4

12.7 MB

10. Program security assessment.srt

6.2 KB

11. Unsafe applications.mp4

26.2 MB

11. Unsafe applications.srt

11.9 KB

12. Program Security Assessment - notes for the examination.html

0.0 KB

12.1 13-2-CISS-Ethical-Hacking-Training-2.0-by-www.SecAcademy.com.pdf.pdf

1.1 MB

13. Check your knowledge and get ready for the exam.html

0.2 KB

/.../3. Introduction to Cyber Threats/

1. Introduction to Current Cyber Threats.mp4

21.5 MB

1. Introduction to Current Cyber Threats.srt

6.2 KB

2. IT Prehistory.mp4

27.1 MB

2. IT Prehistory.srt

5.8 KB

3. Let’s look a few years back.mp4

24.8 MB

3. Let’s look a few years back.srt

6.2 KB

4. Cyber crimes - an evolution not revolution.mp4

22.3 MB

4. Cyber crimes - an evolution not revolution.srt

5.9 KB

5. Current Cyber Threats - notes for the examination.pdf

1.5 MB

/.../4. Popular IT Security Myths/

1. Popular myths about IT security - origins.mp4

29.3 MB

1. Popular myths about IT security - origins.srt

6.6 KB

2. Myths #1 - you’ll never be hacked.mp4

30.6 MB

2. Myths #1 - you’ll never be hacked.srt

7.0 KB

3. Myths #2 - you don’t need any protection software or hardware.mp4

27.0 MB

3. Myths #2 - you don’t need any protection software or hardware.srt

6.4 KB

4. Myths #3 - IT security is always a priority.mp4

6.3 MB

4. Myths #3 - IT security is always a priority.srt

1.3 KB

5. Popular Myths About Computer System Security - notes for the examination.pdf

1.0 MB

/.../5. IT Security Trends/

1. Trends in IT Security.mp4

19.6 MB

1. Trends in IT Security.srt

4.3 KB

2. The birth of technology society.mp4

19.5 MB

2. The birth of technology society.srt

3.5 KB

3. EXERCISE How much info can you gather.mp4

14.4 MB

3. EXERCISE How much info can you gather.srt

4.3 KB

4. Fake identity.mp4

22.8 MB

4. Fake identity.srt

5.7 KB

5. Online privacy.mp4

33.6 MB

5. Online privacy.srt

6.8 KB

6. Analyzing sniffing software.mp4

20.5 MB

6. Analyzing sniffing software.srt

3.8 KB

7. Cyber War.mp4

47.6 MB

7. Cyber War.srt

9.0 KB

8. Changing IT Security Trends - notes for the examination.pdf

2.1 MB

/6. Data Security/

1. Objective #1 - Data security - Introduction.mp4

40.7 MB

1. Objective #1 - Data security - Introduction.srt

7.5 KB

2. Integrity of data.mp4

33.7 MB

2. Integrity of data.srt

7.2 KB

3. Data security - notes for the examination.pdf

2.1 MB

4. Confidentiality of data.mp4

33.2 MB

4. Confidentiality of data.srt

5.7 KB

5. EXERCISE Finding confidential data with search engines.mp4

24.6 MB

5. EXERCISE Finding confidential data with search engines.srt

6.1 KB

/.../7. Computer Network Security/

1. Network security - introduction.mp4

23.1 MB

1. Network security - introduction.srt

6.5 KB

2. OSI MODEL #1 - Physical layer.mp4

30.4 MB

2. OSI MODEL #1 - Physical layer.srt

6.6 KB

3. OSI MODEL #2 - Data link layer.mp4

23.9 MB

3. OSI MODEL #2 - Data link layer.srt

5.4 KB

4. Threats MAC spoofing.mp4

28.8 MB

4. Threats MAC spoofing.srt

6.8 KB

5. Threats ARP Poisoning.mp4

32.8 MB

5. Threats ARP Poisoning.srt

7.8 KB

6. EXERCISE Data Link Layer Attack.mp4

37.0 MB

6. EXERCISE Data Link Layer Attack.srt

8.2 KB

7. OSI MODEL #3 - Network layer.mp4

33.2 MB

7. OSI MODEL #3 - Network layer.srt

7.3 KB

8. TCP Tunnelling over ICMP.mp4

36.7 MB

8. TCP Tunnelling over ICMP.srt

7.9 KB

9. Network Protocols - notes for the examination.pdf

2.3 MB

10. OSI MODEL #4 - Transport Layer.mp4

30.0 MB

10. OSI MODEL #4 - Transport Layer.srt

6.5 KB

11. Threats Enumerating Remote Computers.mp4

17.6 MB

11. Threats Enumerating Remote Computers.srt

4.1 KB

12. EXERCISE Transport Layer Attack using METASPLOIT part 1.mp4

13.5 MB

12. EXERCISE Transport Layer Attack using METASPLOIT part 1.srt

6.0 KB

13. EXERCISE Transport Layer Attack using METASPLOIT part 2.mp4

27.4 MB

13. EXERCISE Transport Layer Attack using METASPLOIT part 2.srt

5.8 KB

14. OSI MODEL #5 - Session Layer.mp4

17.2 MB

14. OSI MODEL #5 - Session Layer.srt

4.2 KB

15. Transport Protocols - notes for the examination.pdf

1.2 MB

16. OSI MODEL #6 - Presentation Layer.mp4

39.2 MB

16. OSI MODEL #6 - Presentation Layer.srt

7.0 KB

17. OSI MODEL #7 - Application Layer.mp4

17.7 MB

17. OSI MODEL #7 - Application Layer.srt

4.3 KB

18. EXERCISE Application Layer Attacks.mp4

19.9 MB

18. EXERCISE Application Layer Attacks.srt

6.0 KB

19. Backtrack Attack Demonstration.mp4

16.4 MB

19. Backtrack Attack Demonstration.srt

3.8 KB

20. Man-in-the-Middle and Denial of Service Attacks.mp4

14.9 MB

20. Man-in-the-Middle and Denial of Service Attacks.srt

3.0 KB

21. Modifying Transmitted Packets.mp4

28.1 MB

21. Modifying Transmitted Packets.srt

5.2 KB

22. Unencrypted protocols.mp4

14.3 MB

22. Unencrypted protocols.srt

3.3 KB

23. Application Protocols - notes for the examination.pdf

2.3 MB

/.../8. Designing Secure Computer Networks/

1. Designing Computer Networks - introduction.mp4

11.5 MB

1. Designing Computer Networks - introduction.srt

2.5 KB

2. Subnetting IPv4.mp4

30.5 MB

2. Subnetting IPv4.srt

8.0 KB

3. Subnetting IPv6.mp4

18.3 MB

3. Subnetting IPv6.srt

3.6 KB

4. Subnetting - notes for the examination.pdf

1.5 MB

5. IPv6 address notation.mp4

28.7 MB

5. IPv6 address notation.srt

7.1 KB

6. DMZ demilitarized Zone.mp4

31.8 MB

6. DMZ demilitarized Zone.srt

7.0 KB

7. Protocols and services IP SEC.mp4

45.9 MB

7. Protocols and services IP SEC.srt

10.8 KB

8. IP SEC Phase 1.mp4

22.8 MB

8. IP SEC Phase 1.srt

8.4 KB

9. Network Address translation.mp4

55.2 MB

9. Network Address translation.srt

13.8 KB

10. Network access control RADIUS.mp4

50.8 MB

10. Network access control RADIUS.srt

12.3 KB

11. Protocols and Services - notes for the examination.pdf

1.3 MB

/9. Network administration/

1. Introduction to Monitoring Transmitted Data.mp4

6.5 MB

1. Introduction to Monitoring Transmitted Data.srt

1.3 KB

2. Monitoring Transmitted Data - Basic informations.mp4

43.1 MB

2. Monitoring Transmitted Data - Basic informations.srt

10.0 KB

3. Intrusion detection systems.mp4

40.1 MB

3. Intrusion detection systems.srt

9.2 KB

4. Why are firewalls and NDIS not enough.mp4

29.6 MB

4. Why are firewalls and NDIS not enough.srt

6.5 KB

5. Wireshark - Introduction to network analysis.mp4

32.1 MB

5. Wireshark - Introduction to network analysis.srt

8.0 KB

6. How to use Wireshark.mp4

45.7 MB

6. How to use Wireshark.srt

10.4 KB

7. Analyzing Captured data.mp4

32.5 MB

7. Analyzing Captured data.srt

6.7 KB

8. How to analyze telnet protocol.mp4

39.8 MB

8. How to analyze telnet protocol.srt

9.1 KB

9. Intrusion detection.mp4

48.6 MB

9. Intrusion detection.srt

8.9 KB

10. Scanning computers.mp4

37.0 MB

10. Scanning computers.srt

8.4 KB

11. Monitoring transmitted data - notes for the examination.pdf

1.9 MB

/.../10. Wireless Networks Security/

1. Wireless Networks.mp4

7.3 MB

1. Wireless Networks.srt

1.4 KB

2. WIFI security solutions - introduction.mp4

30.6 MB

2. WIFI security solutions - introduction.srt

6.5 KB

3. WIFI - working principles.mp4

30.8 MB

3. WIFI - working principles.srt

6.8 KB

4. Other wireless technologies.mp4

13.8 MB

4. Other wireless technologies.srt

3.4 KB

5. Threats and risks.mp4

19.4 MB

5. Threats and risks.srt

5.2 KB

6. Ineffective solutions.mp4

19.9 MB

6. Ineffective solutions.srt

4.8 KB

7. Authentication methods.mp4

38.9 MB

7. Authentication methods.srt

10.0 KB

8. 802.11 WEP.mp4

32.9 MB

8. 802.11 WEP.srt

7.9 KB

9. 802.11I WPA.mp4

33.1 MB

9. 802.11I WPA.srt

6.7 KB

10. Standards and Security Solutions - notes for the examination.pdf

1.5 MB

11. Threats of WIFI networks.mp4

32.0 MB

11. Threats of WIFI networks.srt

6.9 KB

12. Client Attacks Launching a rogue access point.mp4

35.2 MB

12. Client Attacks Launching a rogue access point.srt

7.7 KB

13. Client Attacks Evil twin.mp4

23.9 MB

13. Client Attacks Evil twin.srt

5.4 KB

14. Client Attacks Denial of service.mp4

38.3 MB

14. Client Attacks Denial of service.srt

10.6 KB

15. EXERCISE WPA attack.mp4

9.3 MB

15. EXERCISE WPA attack.srt

4.0 KB

16. Wi-Fi Security Threats - notes for the examination.pdf

1.8 MB

/.../11. Operating Systems Security/

1. Operating systems security - introduction.mp4

50.4 MB

1. Operating systems security - introduction.srt

10.5 KB

2. Security boundaries.mp4

22.2 MB

2. Security boundaries.srt

5.5 KB

3. Three core.mp4

31.2 MB

3. Three core.srt

8.4 KB

4. EXERCISE OS boundaries.mp4

41.0 MB

4. EXERCISE OS boundaries.srt

7.9 KB

5. Process isolation.mp4

28.2 MB

5. Process isolation.srt

7.3 KB

6. Kernel Mode Code Signing.mp4

26.9 MB

6. Kernel Mode Code Signing.srt

7.1 KB

7. Java Virtual Machine and code access security.mp4

19.6 MB

7. Java Virtual Machine and code access security.srt

5.0 KB

8. OS Security Boundaries - notes for the examination.pdf

4.5 MB

9. Malware.mp4

47.0 MB

9. Malware.srt

14.4 KB

10. EXERCISE Vulnerability attacks.mp4

49.9 MB

10. EXERCISE Vulnerability attacks.srt

10.7 KB

11. EXERCISE Identifying suspicious processes.mp4

31.4 MB

11. EXERCISE Identifying suspicious processes.srt

7.9 KB

12. Demonstration Process Explorer.mp4

40.0 MB

12. Demonstration Process Explorer.srt

10.1 KB

13. EXERCISE Removing malware.mp4

48.1 MB

13. EXERCISE Removing malware.srt

9.7 KB

14. Rootkits.mp4

30.4 MB

14. Rootkits.srt

6.9 KB

15. EXERCISE Detecting rootkits.mp4

61.1 MB

15. EXERCISE Detecting rootkits.srt

12.4 KB

16. EXERCISE Security evaluation.mp4

18.7 MB

16. EXERCISE Security evaluation.srt

6.7 KB

17. Malware - notes for the examination.pdf

2.6 MB

/.../12. Access Control/

1. Authentication and authorisation - Introduction.mp4

10.1 MB

1. Authentication and authorisation - Introduction.srt

2.0 KB

2. Authentication users.mp4

32.9 MB

2. Authentication users.srt

8.1 KB

3. How secure is your password.mp4

16.7 MB

3. How secure is your password.srt

5.8 KB

4. Authentication protocols and services.mp4

33.4 MB

4. Authentication protocols and services.srt

8.9 KB

5. Authentication - notes for the examination.pdf

3.0 MB

6. LM Hash.mp4

32.2 MB

6. LM Hash.srt

7.7 KB

7. Cached Credentials.mp4

19.0 MB

7. Cached Credentials.srt

5.2 KB

8. KERBEROS.mp4

55.1 MB

8. KERBEROS.srt

12.5 KB

9. Identity Theft.mp4

45.0 MB

9. Identity Theft.srt

10.7 KB

10. EXERCISE Offline attacks.mp4

47.9 MB

10. EXERCISE Offline attacks.srt

13.2 KB

11. Using online cracking services.mp4

39.5 MB

11. Using online cracking services.srt

9.8 KB

12. Identity Theft - notes for the examination.pdf

2.2 MB

/.../13. Windows Security/

1. Windows Security - what you’ll learn.mp4

8.0 MB

1. Windows Security - what you’ll learn.srt

1.4 KB

2. User Account Control.mp4

33.6 MB

2. User Account Control.srt

6.9 KB

3. UAC configuration.mp4

36.8 MB

3. UAC configuration.srt

9.2 KB

4. Additional Security Features - ASLR and DEP.mp4

42.9 MB

4. Additional Security Features - ASLR and DEP.srt

13.2 KB

5. PatchGuard.mp4

8.3 MB

5. PatchGuard.srt

1.6 KB

6. Techniques and Methods - notes for the examination.pdf

1.5 MB

7. Encryption - key protection.mp4

48.6 MB

7. Encryption - key protection.srt

16.5 KB

8. Drive encryption.mp4

39.2 MB

8. Drive encryption.srt

9.5 KB

9. BitLocker.mp4

38.2 MB

9. BitLocker.srt

9.2 KB

10. BitLocker To Go Reader.mp4

19.3 MB

10. BitLocker To Go Reader.srt

5.2 KB

11. File and folder encryption - EFS.mp4

36.2 MB

11. File and folder encryption - EFS.srt

8.3 KB

12. EXERCISE EFS.mp4

16.1 MB

12. EXERCISE EFS.srt

6.2 KB

13. Encryption - notes for the examination.pdf

1.7 MB

/.../14. Security Policies/

1. Security policies – introduction.mp4

6.2 MB

1. Security policies – introduction.srt

2.2 KB

2. What is security.mp4

11.4 MB

2. What is security.srt

4.0 KB

3. Information security.mp4

10.8 MB

3. Information security.srt

4.2 KB

4. Information security - level up.mp4

10.4 MB

4. Information security - level up.srt

4.4 KB

5. Security issues.mp4

13.5 MB

5. Security issues.srt

5.1 KB

6. Why are security solutions fallible.mp4

16.2 MB

6. Why are security solutions fallible.srt

6.1 KB

7. Security policy issues.mp4

13.2 MB

7. Security policy issues.srt

5.2 KB

8. Introduction to threat modelling and classification.mp4

14.0 MB

8. Introduction to threat modelling and classification.srt

5.8 KB

9. Threat modelling - STRIDE.mp4

11.1 MB

9. Threat modelling - STRIDE.srt

4.2 KB

10. STRIDE Spoofing identity.mp4

14.5 MB

10. STRIDE Spoofing identity.srt

5.7 KB

11. STRIDE Tampering with Data.mp4

13.5 MB

11. STRIDE Tampering with Data.srt

5.1 KB

12. STRIDE Denial of Service.mp4

10.9 MB

12. STRIDE Denial of Service.srt

4.3 KB

/.../15. Risk Management/

1. Introduction to Risk Management.mp4

4.1 MB

1. Introduction to Risk Management.srt

1.7 KB

2. Attack methods.mp4

18.1 MB

2. Attack methods.srt

7.7 KB

3. Local attacks.mp4

8.3 MB

3. Local attacks.srt

3.4 KB

4. Target scanning and enumeration techniques #1.mp4

16.6 MB

4. Target scanning and enumeration techniques #1.srt

6.4 KB

5. Target scanning and enumeration techniques #2.mp4

8.8 MB

5. Target scanning and enumeration techniques #2.srt

3.8 KB

6. Passive scanning.mp4

7.5 MB

6. Passive scanning.srt

2.1 KB

7. Attack Methodologies - notes for the examination.html

0.0 KB

7.1 03-1-CISS-Ethical-Hacking-Training-2.0-by-www.SecAcademy.com.pdf.pdf

1.7 MB

8. Introduction to risk assessment.mp4

19.0 MB

8. Introduction to risk assessment.srt

7.2 KB

9. DREAD Risk assessment model.mp4

13.3 MB

9. DREAD Risk assessment model.srt

5.3 KB

10. DREAD Exploitability.mp4

14.6 MB

10. DREAD Exploitability.srt

6.1 KB

11. EXERCISE Risk Assessment.mp4

19.0 MB

11. EXERCISE Risk Assessment.srt

8.3 KB

12. Risk Assessment - notes for the examination.html

0.0 KB

12.1 03-2-CISS-Ethical-Hacking-Training-2.0-by-www.SecAcademy.com.pdf.pdf

1.9 MB

13. Introduction to Social Engineering and rogue software.mp4

12.0 MB

13. Introduction to Social Engineering and rogue software.srt

4.8 KB

14. Manipulation tactics.mp4

23.2 MB

14. Manipulation tactics.srt

10.7 KB

15. EXERCISE Social Engineering attacks.mp4

19.9 MB

15. EXERCISE Social Engineering attacks.srt

7.0 KB

16. SE with KALI BackTrack.mp4

17.0 MB

16. SE with KALI BackTrack.srt

7.5 KB

17. Rogue Software.mp4

7.7 MB

17. Rogue Software.srt

2.8 KB

18. Fraud tools #1.mp4

21.0 MB

18. Fraud tools #1.srt

7.5 KB

19. Fraud tools #2.mp4

18.6 MB

19. Fraud tools #2.srt

7.3 KB

20. Social Engineering and Rogue Software - notes for the examination.html

0.0 KB

20.1 03-3-CISS-Ethical-Hacking-Training-2.0-by-www.SecAcademy.com.pdf.pdf

3.0 MB

/.../16. Defence in Depth/

1. Introduction to Defence in Depth.mp4

4.8 MB

1. Introduction to Defence in Depth.srt

1.7 KB

2. How to use Defence in Depth model.mp4

15.4 MB

2. How to use Defence in Depth model.srt

6.3 KB

3. DiD OS and LAN Layers.mp4

16.9 MB

3. DiD OS and LAN Layers.srt

7.3 KB

4. DiD Perimeter and Physical Access Layers.mp4

13.6 MB

4. DiD Perimeter and Physical Access Layers.srt

6.3 KB

5. DiD Demonstration.mp4

7.3 MB

5. DiD Demonstration.srt

2.9 KB

6. Automated attack targeting a service.mp4

15.9 MB

6. Automated attack targeting a service.srt

5.4 KB

7. Automated user-targeting attack.mp4

14.1 MB

7. Automated user-targeting attack.srt

5.1 KB

8. The Defence in Depth Model - notes for the examination.html

0.0 KB

8.1 04-1-CISS-Ethical-Hacking-Training-2.0-by-www.SecAcademy.com.pdf.pdf

1.7 MB

9. Introduction to Immutable laws of security - Law #1.mp4

14.7 MB

9. Introduction to Immutable laws of security - Law #1.srt

5.3 KB

10. Law #2.mp4

8.0 MB

10. Law #2.srt

3.3 KB

11. Law #3.mp4

6.1 MB

11. Law #3.srt

2.5 KB

12. Law #4.mp4

6.3 MB

12. Law #4.srt

2.0 KB

13. Law #5.mp4

9.2 MB

13. Law #5.srt

3.6 KB

14. Law #6.mp4

6.1 MB

14. Law #6.srt

2.5 KB

15. Law #7.mp4

3.1 MB

15. Law #7.srt

1.4 KB

16. Law #8.mp4

4.8 MB

16. Law #8.srt

1.8 KB

17. Law #9.mp4

9.7 MB

17. Law #9.srt

4.7 KB

18. Law #10.mp4

2.1 MB

18. Law #10.srt

0.8 KB

19. Laws for administrators.mp4

14.5 MB

19. Laws for administrators.srt

6.9 KB

20. Immutable Laws of Security - notes for the examination.html

0.0 KB

20.1 04-2-CISS-Ethical-Hacking-Training-2.0-by-www.SecAcademy.com.pdf.pdf

1.7 MB

/.../17. Disaster Recovery/

1. Introduction to Disaster Recovery.mp4

4.6 MB

1. Introduction to Disaster Recovery.srt

1.7 KB

2. How to reduce losses.mp4

15.6 MB

2. How to reduce losses.srt

6.1 KB

3. Ensuring continous availability.mp4

11.3 MB

3. Ensuring continous availability.srt

4.5 KB

4. Threat discovery #1.mp4

12.9 MB

4. Threat discovery #1.srt

4.7 KB

5. Threat discovery #2.mp4

9.3 MB

5. Threat discovery #2.srt

4.0 KB

6. Audit users and keep control accounts.mp4

13.9 MB

6. Audit users and keep control accounts.srt

5.3 KB

7. High risk users.mp4

8.3 MB

7. High risk users.srt

3.7 KB

8. Collecting and analysing evidence.mp4

19.2 MB

8. Collecting and analysing evidence.srt

7.1 KB

9. Forensics example.mp4

11.1 MB

9. Forensics example.srt

4.1 KB

10. CONFICKER CASE STUDY.mp4

21.0 MB

10. CONFICKER CASE STUDY.srt

8.0 KB

11. How to reduce losses - notes for the examination.html

0.0 KB

11.1 05-1-CISS-Ethical-Hacking-Training-2.0-by-www.SecAcademy.com.pdf.pdf

2.6 MB

/.../18. Application Security - Configuration and Management/

1. Here’s what you’ll learn in this module.mp4

3.3 MB

1. Here’s what you’ll learn in this module.srt

1.2 KB

2. Managing applications.mp4

18.1 MB

2. Managing applications.srt

10.5 KB

3. Software updates.mp4

6.5 MB

3. Software updates.srt

3.2 KB

4. MS Update.mp4

17.0 MB

4. MS Update.srt

7.7 KB

5. System Center Configuration Manager.mp4

6.6 MB

5. System Center Configuration Manager.srt

3.2 KB

6. Blocking applications.mp4

18.9 MB

6. Blocking applications.srt

8.9 KB

7. Software restrictions policies.mp4

15.2 MB

7. Software restrictions policies.srt

6.9 KB

8. EXERCISE Application control rules.mp4

28.5 MB

8. EXERCISE Application control rules.srt

13.7 KB

9. Isolating applications.mp4

17.7 MB

9. Isolating applications.srt

7.3 KB

10. How to protect users without interrupting their work - notes for the examination.html

0.0 KB

10.1 14-1-CISS-Ethical-Hacking-Training-2.0-by-www.SecAcademy.com.pdf.pdf

1.7 MB

/19. Cryptography/

1. Introduction to cryptography.mp4

24.7 MB

1. Introduction to cryptography.srt

11.6 KB

2. History of ciphers.mp4

26.7 MB

2. History of ciphers.srt

12.5 KB

3. Symmetric and asymmetric ciphers.mp4

15.8 MB

3. Symmetric and asymmetric ciphers.srt

6.9 KB

4. Symmetric-key algorithms.mp4

14.2 MB

4. Symmetric-key algorithms.srt

6.2 KB

5. Block ciphers.mp4

16.1 MB

5. Block ciphers.srt

6.6 KB

6. Data encryption standard.mp4

17.4 MB

6. Data encryption standard.srt

7.3 KB

7. DES-X.mp4

19.1 MB

7. DES-X.srt

7.8 KB

8. Advanced encryption standards.mp4

13.5 MB

8. Advanced encryption standards.srt

5.6 KB

9. Block cipher modes.mp4

18.3 MB

9. Block cipher modes.srt

7.9 KB

10. Stream Ciphers - RC4.mp4

9.0 MB

10. Stream Ciphers - RC4.srt

4.0 KB

11. Asymmetric-key algorithms.mp4

20.0 MB

11. Asymmetric-key algorithms.srt

8.7 KB

12. RSA.mp4

13.5 MB

12. RSA.srt

5.8 KB

13. ELGAMAL.mp4

5.1 MB

13. ELGAMAL.srt

2.2 KB

14. HASH functions.mp4

15.1 MB

14. HASH functions.srt

6.2 KB

15. Digital signature.mp4

16.2 MB

15. Digital signature.srt

6.8 KB

16. Hybrid Schemes.mp4

16.8 MB

16. Hybrid Schemes.srt

7.2 KB

17. Symmetric and Asymmetric Ciphers - notes for the examination.html

0.0 KB

17.1 15-1-CISS-Ethical-Hacking-Training-2.0-by-www.SecAcademy.com.pdf.pdf

2.6 MB

/.../20. Public Key Infrastructure/

1. Introduction to cryptology.mp4

6.3 MB

1. Introduction to cryptology.srt

2.7 KB

2. Public key infrastructure.mp4

15.5 MB

2. Public key infrastructure.srt

7.5 KB

3. Implementing public key infrastructure.mp4

13.4 MB

3. Implementing public key infrastructure.srt

6.6 KB

4. What will PKI allow you.mp4

15.2 MB

4. What will PKI allow you.srt

7.7 KB

5. EXERCISE Certificates.mp4

21.6 MB

5. EXERCISE Certificates.srt

10.4 KB

6. Planning the PKI.mp4

23.7 MB

6. Planning the PKI.srt

10.5 KB

7. Certificate life cycle.mp4

17.0 MB

7. Certificate life cycle.srt

7.4 KB

8. PKI Administration.mp4

20.7 MB

8. PKI Administration.srt

8.7 KB

9. Threat Modelling and Classification - notes for the examination.html

0.0 KB

9.1 02-2-CISS-Ethical-Hacking-Training-2.0-by-www.SecAcademy.com.pdf.pdf

1.5 MB

10. Public Key Infrastructure - Trust but verify - notes for the examination.html

0.0 KB

10.1 16-1-CISS-Ethical-Hacking-Training-2.0-by-www.SecAcademy.com.pdf.pdf

2.3 MB

/.../21. Prepare for the examination/

1. Answer sample questions which you can find during the examination.html

0.2 KB

/22. Certificate/

1. The Certificate - see how it looks like.pdf

494.0 KB

/.../23. Rootkits and Stealth Apps Creating and Revealing v2.0 (course preview)/

1. Wiriting a Shellcode.mp4

188.6 MB

1. Wiriting a Shellcode.srt

16.8 KB

/.../24. BONUS Section/

1. BONUS Examination - your voucher.pdf

95.6 KB

2. BONUS LECTURE Learn more and get to know our other courses.html

6.0 KB

3. Thanks for joining.html

0.4 KB

/1. Introduction/

1. Teaser - Hacking a Windows 10 Computer & Accessing Webcam.mp4

88.8 MB

1. Teaser - Hacking a Windows 10 Computer & Accessing Webcam.srt

13.0 KB

2. Course Introduction & Overview.mp4

61.2 MB

2. Course Introduction & Overview.srt

5.6 KB

3. What Is Hacking & Why Learn It .mp4

71.4 MB

3. What Is Hacking & Why Learn It .srt

6.0 KB

/.../2. Setting up a Hacking Lab/

1. Lab Overview & Needed Software.mp4

111.7 MB

1. Lab Overview & Needed Software.srt

14.3 KB

1.1 Virtual Box Download Page.html

0.1 KB

1.2 The lab.pdf.pdf

200.3 KB

2. Installing Kali 2019 As a Virtual Machine.mp4

140.3 MB

2. Installing Kali 2019 As a Virtual Machine.srt

15.3 KB

2.1 Kali 2019 Download Link (32bits).html

0.1 KB

2.2 How To Fix Blank Screen When Starting Kali.html

0.2 KB

2.3 Kali 2019 Download Link (64bit).html

0.2 KB

2.4 Kali 2019 Download Link 2 (64bits).html

0.1 KB

2.5 How To Fix Missing Nat Network Issue.html

0.1 KB

2.6 Installing Kali Using ISO (use this method to install it as a MAIN machine)..html

0.1 KB

3. Creating & Using Snapshots.mp4

93.7 MB

3. Creating & Using Snapshots.srt

11.4 KB

/3. Linux Basics/

1. Basic Overview of Kali Linux.mp4

112.7 MB

1. Basic Overview of Kali Linux.srt

9.1 KB

1.1 Best USB Wireless (WiFi) Adapters For Hacking.html

0.2 KB

2. The Terminal & Linux Commands.mp4

234.3 MB

2. The Terminal & Linux Commands.srt

21.5 KB

2.1 Linux Commands List.html

0.1 KB

/4. Network Hacking/

1. Introduction to Network Penetration Testing Hacking.mp4

54.6 MB

1. Introduction to Network Penetration Testing Hacking.srt

5.6 KB

2. Networks Basics.mp4

70.6 MB

2. Networks Basics.srt

7.1 KB

2.1 Networks - Pre Connection Attacks.pdf.pdf

1.2 MB

3. Connecting a Wireless Adapter To Kali.mp4

74.5 MB

3. Connecting a Wireless Adapter To Kali.srt

9.2 KB

3.1 Best USB Wireless (WiFi) Adapters For Hacking.html

0.1 KB

3.2 Virtual Box Extension Pack Download Page.html

0.1 KB

3.3 Website That Sells Supported Wireless Adapters.html

0.1 KB

4. What is MAC Address & How To Change It.mp4

101.7 MB

4. What is MAC Address & How To Change It.srt

13.7 KB

4.1 How to prevent mac from reverting back to the original one.html

0.1 KB

5. Wireless Modes (Managed & Monitor).mp4

52.8 MB

5. Wireless Modes (Managed & Monitor).srt

12.1 KB

5.1 Best USB Wireless (WiFi) Adapters For Hacking.html

0.1 KB

5.2 Another Method to Enable Monitor Mode.html

0.1 KB

/.../5. Network Hacking - Pre Connection Attacks/

1. Packet Sniffing Basics.mp4

43.3 MB

1. Packet Sniffing Basics.srt

10.9 KB

1.1 Networks Pre-Connection Attacks.pdf.pdf

160.4 KB

2. WiFi Bands - 2.4Ghz & 5Ghz Frequencies.mp4

52.0 MB

2. WiFi Bands - 2.4Ghz & 5Ghz Frequencies.srt

16.3 KB

/.../6. Network Hacking - Gaining Access - WEP Cracking/

1. Targeted Packet Sniffing.mp4

58.1 MB

1. Targeted Packet Sniffing.srt

19.3 KB

2. Deauthentication Attack (Disconnecting Any Device From The Network).mp4

65.6 MB

2. Deauthentication Attack (Disconnecting Any Device From The Network).srt

10.9 KB

/.../7. Network Hacking - Gaining Access (WEPWPAWPA2 Cracking)/

1. Gaining Access Introduction.mp4

26.4 MB

1. Gaining Access Introduction.srt

10.5 KB

1.1 Network Hacking - Gaining Access.pdf.pdf

800.8 KB

2. Theory Behind Cracking WEP Encryption.mp4

91.1 MB

2. Theory Behind Cracking WEP Encryption.srt

9.8 KB

/.../8. Network Hacking - Gaining Access - WPA WPA2 Cracking/

1. WEP Cracking Basics.mp4

49.1 MB

1. WEP Cracking Basics.srt

11.9 KB

2. Fake Authentication Attack.mp4

57.8 MB

2. Fake Authentication Attack.srt

12.2 KB

3. ARP Request Replay Attack.mp4

63.4 MB

3. ARP Request Replay Attack.srt

10.3 KB

4. Introduction to WPA and WPA2 Cracking.mp4

56.7 MB

4. Introduction to WPA and WPA2 Cracking.srt

6.1 KB

5. Hacking WPA & WPA2 Without a Wordlist.mp4

63.8 MB

5. Hacking WPA & WPA2 Without a Wordlist.srt

19.1 KB

5.1 Reaver Download Link.html

0.1 KB

5.2 Reaver Alternative Download Link.html

0.1 KB

6. Capturing The Handshake.mp4

48.5 MB

6. Capturing The Handshake.srt

12.5 KB

/.../9. Network Hacking - Gaining Access - Security/

1. Creating a Wordlist.mp4

79.5 MB

1. Creating a Wordlist.srt

13.8 KB

1.1 Some-Links-To-Wordlists.txt.txt

0.4 KB

2. Cracking WPA & WPA2 Using a Wordlist Attack.mp4

61.8 MB

2. Cracking WPA & WPA2 Using a Wordlist Attack.srt

11.5 KB

3. Securing Your Network From Hackers.html

2.8 KB

4. Configuring Wireless Settings for Maximum Security.mp4

30.0 MB

4. Configuring Wireless Settings for Maximum Security.srt

12.4 KB

/.../10. Network Hacking - Post Connection Attacks/

1. Introduction to Post-Connection Attacks.mp4

48.6 MB

1. Introduction to Post-Connection Attacks.srt

3.8 KB

1.1 Post Connection Attacks.pdf.pdf

1.4 MB

/.../11. Network Hacking - Post-Connection Attacks - Information Gathering/

1. Installing Windows As a Virtual Machine.mp4

54.1 MB

1. Installing Windows As a Virtual Machine.srt

7.1 KB

1.1 Windows Virtual Machines Download Page.html

0.1 KB

2. Discovering Devices Connected to the Same Network.mp4

79.7 MB

2. Discovering Devices Connected to the Same Network.srt

14.5 KB

3. Gathering Sensitive Info About Connected Devices (Device Name, Ports....etc).mp4

54.5 MB

3. Gathering Sensitive Info About Connected Devices (Device Name, Ports....etc).srt

12.3 KB

4. Gathering More Sensitive Info (Running Services, Operating System....etc).mp4

66.3 MB

4. Gathering More Sensitive Info (Running Services, Operating System....etc).srt

14.4 KB

/.../12. Network Hacking - Post Connection Attacks - MITM Attacks/

1. What is ARP Poisoning .mp4

146.4 MB

1. What is ARP Poisoning .srt

14.7 KB

2. Intercepting Network Traffic.mp4

67.4 MB

2. Intercepting Network Traffic.srt

10.7 KB

3. Bettercap Basics.mp4

70.3 MB

3. Bettercap Basics.srt

14.5 KB

4. ARP Spoofing Using Bettercap.mp4

85.3 MB

4. ARP Spoofing Using Bettercap.srt

13.9 KB

5. Spying on Network Devices (Capturing Passwords, Visited Websites...etc).mp4

73.9 MB

5. Spying on Network Devices (Capturing Passwords, Visited Websites...etc).srt

8.8 KB

6. Creating Custom Spoofing Script.mp4

111.3 MB

6. Creating Custom Spoofing Script.srt

15.7 KB

7. Understanding HTTPS & How to Bypass it.mp4

98.0 MB

7. Understanding HTTPS & How to Bypass it.srt

9.8 KB

7.1 hstshijack.zip.zip

14.0 KB

8. Bypassing HTTPS.mp4

90.2 MB

8. Bypassing HTTPS.srt

11.5 KB

9. Bypassing HSTS.mp4

161.7 MB

9. Bypassing HSTS.srt

17.3 KB

9.1 Bettercap V2.23 Download Link.html

0.1 KB

9.2 How To Fix the dial tcp error.html

0.1 KB

9.3 Bettercap V2.23 Alternative Download Link.html

0.1 KB

10. DNS Spoofing - Controlling DNS Requests on The Network.mp4

132.8 MB

10. DNS Spoofing - Controlling DNS Requests on The Network.srt

19.3 KB

11. Injecting Javascript Code.mp4

145.1 MB

11. Injecting Javascript Code.srt

17.8 KB

11.1 alert.js.js

0.0 KB

12. Wireshark - Basic Overview & How To Use It With MITM Attacks.mp4

125.4 MB

12. Wireshark - Basic Overview & How To Use It With MITM Attacks.srt

16.9 KB

13. Wireshark - Sniffing & Analysing Data.mp4

87.5 MB

13. Wireshark - Sniffing & Analysing Data.srt

11.0 KB

14. Wireshark - Using Filters, Tracing & Dissecting Packets.mp4

86.7 MB

14. Wireshark - Using Filters, Tracing & Dissecting Packets.srt

11.3 KB

15. Wireshark - Capturing Passwords & Anything Sent By Any Device In The Network.mp4

114.9 MB

15. Wireshark - Capturing Passwords & Anything Sent By Any Device In The Network.srt

12.5 KB

16. Creating a Fake Access Point (Honeypot) - Theory.mp4

151.2 MB

16. Creating a Fake Access Point (Honeypot) - Theory.srt

21.2 KB

16.1 Best Wireless Adapters For Hacking.html

0.1 KB

16.2 install-mana.sh.sh

0.4 KB

17. Creating a Fake Access Point (Honeypot) - Practical.mp4

101.8 MB

17. Creating a Fake Access Point (Honeypot) - Practical.srt

16.6 KB

/.../13. Network Hacking - Detection & Security/

1. Detecting ARP Poisoning Attacks.mp4

79.9 MB

1. Detecting ARP Poisoning Attacks.srt

9.2 KB

1.1 Xarp Download Page.html

0.1 KB

2. Detecting suspicious Activities In The Network.mp4

91.2 MB

2. Detecting suspicious Activities In The Network.srt

10.0 KB

3. Preventing MITM Attacks - Method 1.mp4

92.9 MB

3. Preventing MITM Attacks - Method 1.srt

16.0 KB

4. Preventing MITM Attacks - Method 2.mp4

147.8 MB

4. Preventing MITM Attacks - Method 2.srt

19.0 KB

4.1 ZSVPN Website - zSecurity's VPN service (our own one).html

0.1 KB

/.../14. Gaining Access To Computers/

1. Gaining Access Introduction.mp4

84.8 MB

1. Gaining Access Introduction.srt

10.5 KB

/.../15. Gaining Access - Server Side Attacks/

1. Installing Metasploitable As a Virtual Machine.mp4

106.2 MB

1. Installing Metasploitable As a Virtual Machine.srt

11.7 KB

1.1 Metasploitable Download Page.html

0.1 KB

2. Introduction to Server-Side Attacks.mp4

65.6 MB

2. Introduction to Server-Side Attacks.srt

8.0 KB

2.1 Gaining Access - Server Side Attacks.pdf.pdf

172.9 KB

3. Basic Information Gathering & Exploitation.mp4

97.9 MB

3. Basic Information Gathering & Exploitation.srt

8.0 KB

4. Hacking a Remote Server Using a Basic Metasploit Exploit.mp4

84.8 MB

4. Hacking a Remote Server Using a Basic Metasploit Exploit.srt

13.9 KB

5. Exploiting a Code Execution Vulnerability to Hack into a Remote Server.mp4

79.8 MB

5. Exploiting a Code Execution Vulnerability to Hack into a Remote Server.srt

17.7 KB

6. Nexpose - Installing Nexpose.mp4

125.9 MB

6. Nexpose - Installing Nexpose.srt

15.7 KB

6.1 Nexpose Download Page.html

0.1 KB

6.2 Nexpose Download Page - Alternative Link.html

0.1 KB

6.3 Use This Link To Get a Temporary Email Address To Use With Nexpose.html

0.1 KB

6.4 nexpose-rolling-hack.txt.txt

0.4 KB

7. Nexpose - Scanning a Target Server For Vulnerabilities.mp4

64.9 MB

7. Nexpose - Scanning a Target Server For Vulnerabilities.srt

16.0 KB

8. Nexpose - Analysing Scan Results & Generating Reports.mp4

82.5 MB

8. Nexpose - Analysing Scan Results & Generating Reports.srt

14.1 KB

/.../16. Gaining Access - Client Side Attacks/

1. Introduction to Client-Side Attacks.mp4

40.7 MB

1. Introduction to Client-Side Attacks.srt

4.6 KB

1.1 Gaining Access - Client Side Attacks.pdf.pdf

192.0 KB

2. Installing Veil Framework 3.1.mp4

43.7 MB

2. Installing Veil Framework 3.1.srt

10.7 KB

2.1 Veil Framework Github Repo.html

0.1 KB

3. Veil Overview & Payloads Basics.mp4

14.1 MB

3. Veil Overview & Payloads Basics.srt

13.9 KB

4. Generating An Undetectable Backdoor.mp4

21.8 MB

4. Generating An Undetectable Backdoor.srt

17.8 KB

4.1 Alternative to Nodistribute.html

0.1 KB

4.2 Nodistribute - Online Virus Scanner.html

0.1 KB

4.3 Another way of generating an undetectable backdoor.html

0.1 KB

5. Listening For Incoming Connections.mp4

13.1 MB

5. Listening For Incoming Connections.srt

12.3 KB

6. Using A Basic Delivery Method To Test The Backdoor & Hack Windows 10.mp4

16.7 MB

6. Using A Basic Delivery Method To Test The Backdoor & Hack Windows 10.srt

12.3 KB

7. Hacking Windows 10 Using Fake Update.mp4

149.1 MB

7. Hacking Windows 10 Using Fake Update.srt

21.7 KB

7.1 evilgrade-installation-steps-updated.txt.txt

0.7 KB

8. Backdooring Downloads on The Fly to Hack Windows 10.mp4

154.7 MB

8. Backdooring Downloads on The Fly to Hack Windows 10.srt

20.0 KB

8.1 install_bdfproxy.sh.sh

0.2 KB

8.2 payloads.txt.txt

0.3 KB

8.3 flushiptables.sh.sh

0.2 KB

9. How to Protect Yourself From The Discussed Delivery Methods.mp4

63.8 MB

9. How to Protect Yourself From The Discussed Delivery Methods.srt

6.8 KB

9.1 WinMD5 Download Page.html

0.1 KB

/.../17. Gaining Access - Client Side Attacks - Social Engineering/

1. Introduction to Social Engineering.mp4

51.5 MB

1. Introduction to Social Engineering.srt

5.8 KB

2. Maltego Basics.mp4

74.5 MB

2. Maltego Basics.srt

10.8 KB

2.1 How to fix Maltego if its not starting.html

0.1 KB

3. Discovering Websites, Links & Social Accounts Associated With Target.mp4

23.7 MB

3. Discovering Websites, Links & Social Accounts Associated With Target.srt

14.8 KB

4. Discovering Twitter Friends & Associated Accounts.mp4

16.0 MB

4. Discovering Twitter Friends & Associated Accounts.srt

8.4 KB

5. Discovering Emails Of The Target's Friends.mp4

13.8 MB

5. Discovering Emails Of The Target's Friends.srt

6.2 KB

6. Analysing The Gathered Info & Building An Attack Strategy.mp4

27.8 MB

6. Analysing The Gathered Info & Building An Attack Strategy.srt

15.9 KB

7. Backdooring Any File Type (images, pdf's ...etc).mp4

13.4 MB

7. Backdooring Any File Type (images, pdf's ...etc).srt

8.7 KB

7.1 autoit-download-and-execute.txt.txt

0.5 KB

8. Compiling & Changing Trojan's Icon.mp4

17.2 MB

8. Compiling & Changing Trojan's Icon.srt

10.4 KB

9. Spoofing .exe Extension To Any Extension (jpg, pdf ...etc).mp4

20.2 MB

9. Spoofing .exe Extension To Any Extension (jpg, pdf ...etc).srt

14.3 KB

10. Spoofing Emails - Setting Up an SMTP Server.mp4

90.0 MB

10. Spoofing Emails - Setting Up an SMTP Server.srt

14.0 KB

11. Email Spoofing - Sending Emails as Any Email Account.mp4

146.1 MB

11. Email Spoofing - Sending Emails as Any Email Account.srt

25.5 KB

12. BeEF Overview & Basic Hook Method.mp4

155.7 MB

12. BeEF Overview & Basic Hook Method.srt

19.7 KB

13. BeEF - Hooking Targets Using Bettercap.mp4

89.7 MB

13. BeEF - Hooking Targets Using Bettercap.srt

12.2 KB

13.1 inject_beef.js.js

0.1 KB

14. BeEF - Running Basic Commands On Target.mp4

48.4 MB

14. BeEF - Running Basic Commands On Target.srt

7.8 KB

15. BeEF - Stealing Passwords Using A Fake Login Prompt.mp4

28.5 MB

15. BeEF - Stealing Passwords Using A Fake Login Prompt.srt

4.1 KB

16. BeEF - Hacking Windows 10 Using a Fake Update Prompt.mp4

38.4 MB

16. BeEF - Hacking Windows 10 Using a Fake Update Prompt.srt

6.4 KB

17. Detecting Trojans Manually.mp4

84.8 MB

17. Detecting Trojans Manually.srt

9.3 KB

18. Detecting Trojans Using a Sandbox.mp4

46.2 MB

18. Detecting Trojans Using a Sandbox.srt

5.6 KB

18.1 Hybrid Analysis.html

0.1 KB

/.../18. Gaining Access - Using The Above Attacks Outside The Local Network/

1. Overview of the Setup.mp4

109.1 MB

1. Overview of the Setup.srt

12.5 KB

2. Ex1 - Generating a Backdoor That Works Outside The Network.mp4

85.1 MB

2. Ex1 - Generating a Backdoor That Works Outside The Network.srt

10.0 KB

3. Configuring The Router To Forward Connections To Kali.mp4

94.6 MB

3. Configuring The Router To Forward Connections To Kali.srt

13.7 KB

4. Ex2 - Using BeEF Outside The Network.mp4

82.7 MB

4. Ex2 - Using BeEF Outside The Network.srt

10.4 KB

/.../19. Post Exploitation/

1. Introduction to Post Exploitation.mp4

40.0 MB

1. Introduction to Post Exploitation.srt

4.3 KB

1.1 Post Exploitation.pdf.pdf

311.6 KB

2. Meterpreter Basics.mp4

61.0 MB

2. Meterpreter Basics.srt

11.4 KB

3. File System Commands.mp4

44.2 MB

3. File System Commands.srt

8.3 KB

4. Maintaining Access - Basic Methods.mp4

52.7 MB

4. Maintaining Access - Basic Methods.srt

9.8 KB

5. Maintaining Access - Using a Reliable & Undetectable Method.mp4

74.6 MB

5. Maintaining Access - Using a Reliable & Undetectable Method.srt

11.8 KB

6. Spying - Capturing Key Strikes & Taking Screen Shots.mp4

21.8 MB

6. Spying - Capturing Key Strikes & Taking Screen Shots.srt

4.7 KB

7. Pivoting - Theory (What is Pivoting).mp4

114.3 MB

7. Pivoting - Theory (What is Pivoting).srt

11.7 KB

8. Pivoting - Using a Hacked System to Hack Into Other Systems.mp4

74.6 MB

8. Pivoting - Using a Hacked System to Hack Into Other Systems.srt

14.7 KB

/.../20. Website Hacking/

1. Introduction - What Is A Website .mp4

72.1 MB

1. Introduction - What Is A Website .srt

7.8 KB

1.1 Web Application Penetration Testing.pdf.pdf

606.9 KB

2. How To Hack a Website.mp4

58.5 MB

2. How To Hack a Website.srt

7.4 KB

/.../21. Website Hacking - Information Gathering/

1. Gathering Basic Information Using Whois Lookup.mp4

81.1 MB

1. Gathering Basic Information Using Whois Lookup.srt

10.1 KB

1.1 Domaintools Whois Lookup Page.html

0.1 KB

2. Discovering Technologies Used On The Website.mp4

79.9 MB

2. Discovering Technologies Used On The Website.srt

11.1 KB

2.1 Netcraft.html

0.1 KB

3. Gathering Comprehensive DNS Information.mp4

111.7 MB

3. Gathering Comprehensive DNS Information.srt

17.6 KB

3.1 robtex.com.html

0.1 KB

4. Discovering Websites On The Same Server.mp4

51.1 MB

4. Discovering Websites On The Same Server.srt

6.6 KB

5. Discovering Subdomains.mp4

58.2 MB

5. Discovering Subdomains.srt

10.0 KB

6. Discovering Sensitive Files.mp4

75.7 MB

6. Discovering Sensitive Files.srt

12.8 KB

7. Analysing Discovered Files.mp4

34.3 MB

7. Analysing Discovered Files.srt

7.9 KB

/.../22. Website Hacking - File Upload, Code Execution & File Inclusion Vulns/

1. Discovering & Exploiting File Upload Vulnerabilities To Hack Websites.mp4

55.1 MB

1. Discovering & Exploiting File Upload Vulnerabilities To Hack Websites.srt

12.4 KB

2. Discovering & Exploiting Code Execution Vulnerabilities To Hack Websites.mp4

59.5 MB

2. Discovering & Exploiting Code Execution Vulnerabilities To Hack Websites.srt

13.9 KB

2.1 code-execution-reverse-shell-commands.txt.txt

0.9 KB

3. Discovering & Exploiting Local File Inclusion Vulnerabilities.mp4

39.7 MB

3. Discovering & Exploiting Local File Inclusion Vulnerabilities.srt

8.9 KB

4. Remote File Inclusion Vulnerabilities - Configuring PHP Settings.mp4

51.1 MB

4. Remote File Inclusion Vulnerabilities - Configuring PHP Settings.srt

6.0 KB

5. Remote File Inclusion Vulnerabilities - Discovery & Exploitation.mp4

32.9 MB

5. Remote File Inclusion Vulnerabilities - Discovery & Exploitation.srt

9.8 KB

6. Preventing The Above Vulnerabilities.mp4

93.5 MB

6. Preventing The Above Vulnerabilities.srt

13.8 KB

/.../23. Website Hacking - SQL Injection Vulnerabilities/

1. What is SQL.mp4

55.0 MB

1. What is SQL.srt

10.3 KB

1.1 Fix table metasploit.accounts doesn't exist issue.html

0.1 KB

2. Dangers of SQL Injection Vulnerabilities.mp4

43.5 MB

2. Dangers of SQL Injection Vulnerabilities.srt

5.8 KB

3. Discovering SQL injections In POST.mp4

96.3 MB

3. Discovering SQL injections In POST.srt

15.9 KB

4. Bypassing Logins Using SQL injection.mp4

49.9 MB

4. Bypassing Logins Using SQL injection.srt

9.4 KB

5. Discovering SQL injections in GET.mp4

74.8 MB

5. Discovering SQL injections in GET.srt

13.0 KB

6. Reading Database Information.mp4

50.7 MB

6. Reading Database Information.srt

9.0 KB

7. Discovering Database Tables.mp4

31.4 MB

7. Discovering Database Tables.srt

5.4 KB

8. Extracting Sensitive Data From The Database (Such As Passwords, User info...etc).mp4

40.6 MB

8. Extracting Sensitive Data From The Database (Such As Passwords, User info...etc).srt

7.0 KB

9. Reading & Writing Files On The Server Using SQL Injection Vulnerability.mp4

69.1 MB

9. Reading & Writing Files On The Server Using SQL Injection Vulnerability.srt

10.6 KB

10. Discovering SQL Injections & Extracting Data Using SQLmap.mp4

84.8 MB

10. Discovering SQL Injections & Extracting Data Using SQLmap.srt

12.0 KB

11. The Right Way To Prevent SQL Injection Vulnerabilities.mp4

65.9 MB

11. The Right Way To Prevent SQL Injection Vulnerabilities.srt

8.3 KB

/.../24. Website Hacking - Cross Site Scripting Vulnerabilities/

1. Introduction to Cross Site Scripting.mp4

51.0 MB

1. Introduction to Cross Site Scripting.srt

5.7 KB

2. Discovering Reflected XSS.mp4

44.3 MB

2. Discovering Reflected XSS.srt

5.5 KB

3. Discovering Stored XSS.mp4

43.1 MB

3. Discovering Stored XSS.srt

5.9 KB

4. Exploiting XSS - Hooking Vulnerable Page Visitors To BeEF.mp4

93.6 MB

4. Exploiting XSS - Hooking Vulnerable Page Visitors To BeEF.srt

9.1 KB

5. Preventing XSS Vulnerabilities.mp4

55.9 MB

5. Preventing XSS Vulnerabilities.srt

9.2 KB

/.../25. Website Hacking - Discovering Vulnerabilities Automatically/

1. Automatically Scanning Target Website For Vulnerabilities.mp4

46.5 MB

1. Automatically Scanning Target Website For Vulnerabilities.srt

7.8 KB

2. Analysing Scan Results.mp4

46.1 MB

2. Analysing Scan Results.srt

6.8 KB

/.../26. Bonus Section/

1. Bonus Lecture - What's Next.html

8.5 KB

/.../1. Introduction and Installation/

1. Introduction to the course.mp4

61.9 MB

1. Introduction to the course.srt

6.4 KB

2. VirtualBox installation.mp4

239.3 MB

2. VirtualBox installation.srt

21.1 KB

3. Kali Linux installation.mp4

224.2 MB

3. Kali Linux installation.srt

18.4 KB

4. Enabling full-screen.mp4

106.4 MB

4. Enabling full-screen.srt

22.2 KB

/.../2. Basic Linux Commands/

1. Basic commands part 1.mp4

141.7 MB

1. Basic commands part 1.srt

12.0 KB

2. Basic commands part 2.mp4

288.1 MB

2. Basic commands part 2.srt

26.7 KB

3. Basic commands part 3.mp4

174.8 MB

3. Basic commands part 3.srt

16.4 KB

/.../3. Creating a Secure Hacking Environment/

1. Changing IP address and wireless adapter setup.mp4

72.2 MB

1. Changing IP address and wireless adapter setup.srt

6.8 KB

2. Creating a bootable Kali USB drive.mp4

89.9 MB

2. Creating a bootable Kali USB drive.srt

7.2 KB

3. Essential networking terms.mp4

159.6 MB

3. Essential networking terms.srt

12.8 KB

4. Essential hacking terms.mp4

45.6 MB

4. Essential hacking terms.srt

22.4 KB

5. Additional Kali tools to install.mp4

117.7 MB

5. Additional Kali tools to install.srt

11.4 KB

6. Changing our MAC address with macchanger.mp4

90.4 MB

6. Changing our MAC address with macchanger.srt

8.1 KB

/4. Footprinting/

1. Google hacking.mp4

115.9 MB

1. Google hacking.srt

16.1 KB

2. Nikto basics.mp4

110.2 MB

2. Nikto basics.srt

14.0 KB

3. Whois tool.mp4

66.7 MB

3. Whois tool.srt

8.8 KB

4. Email harvesting.mp4

54.8 MB

4. Email harvesting.srt

7.9 KB

5. Shodan.mp4

90.2 MB

5. Shodan.srt

13.8 KB

6. Zone transfer with Dig.mp4

38.9 MB

6. Zone transfer with Dig.srt

9.2 KB

/5. Scanning/

1. Installing Metasploitable.mp4

104.6 MB

1. Installing Metasploitable.srt

9.3 KB

2. Nmap part 1.mp4

207.0 MB

2. Nmap part 1.srt

19.0 KB

3. Nmap part 2.mp4

102.8 MB

3. Nmap part 2.srt

14.6 KB

4. Nmap part 3.mp4

133.1 MB

4. Nmap part 3.srt

15.2 KB

5. Zenmap.mp4

103.7 MB

5. Zenmap.srt

10.0 KB

6. TCP scans.mp4

186.4 MB

6. TCP scans.srt

18.3 KB

7. Nmap bypassing defenses.mp4

176.0 MB

7. Nmap bypassing defenses.srt

19.8 KB

8. Nmap scripts part 1.mp4

117.6 MB

8. Nmap scripts part 1.srt

11.3 KB

9. Nmap scripts part 2.mp4

165.8 MB

9. Nmap scripts part 2.srt

16.9 KB

/.../6. Website Penetration Testing/

1. Installing OWASP.mp4

114.0 MB

1. Installing OWASP.srt

9.9 KB

2. HTTP request.mp4

78.4 MB

2. HTTP request.srt

12.0 KB

3. HTTP response.mp4

104.8 MB

3. HTTP response.srt

12.7 KB

4. Burpsuite configuration.mp4

106.6 MB

4. Burpsuite configuration.srt

16.8 KB

5. Editing packets in Burpsuite.mp4

126.0 MB

5. Editing packets in Burpsuite.srt

16.2 KB

6. Whatweb and Dirb.mp4

110.6 MB

6. Whatweb and Dirb.srt

12.3 KB

7. Password recovery attack.mp4

177.1 MB

7. Password recovery attack.srt

18.8 KB

8. Burpsuite login bruteforce.mp4

125.5 MB

8. Burpsuite login bruteforce.srt

13.8 KB

9. Hydra login bruteforce.mp4

70.3 MB

9. Hydra login bruteforce.srt

10.9 KB

10. Session fixation.mp4

160.7 MB

10. Session fixation.srt

16.8 KB

11. Injection attacks.mp4

37.2 MB

11. Injection attacks.srt

6.7 KB

12. Simple command injection.mp4

90.0 MB

12. Simple command injection.srt

13.8 KB

13. Exploiting command injection vulnerability.mp4

66.5 MB

13. Exploiting command injection vulnerability.srt

9.6 KB

14. Finding blind command injection.mp4

141.9 MB

14. Finding blind command injection.srt

17.4 KB

15. SQL basics.mp4

29.0 MB

15. SQL basics.srt

12.1 KB

16. Manual SQL injection part 1.mp4

67.7 MB

16. Manual SQL injection part 1.srt

15.6 KB

17. Manual SQL injection part 2.mp4

154.2 MB

17. Manual SQL injection part 2.srt

24.8 KB

18. SQLmap basics.mp4

129.9 MB

18. SQLmap basics.srt

20.6 KB

19. XML injection.mp4

112.6 MB

19. XML injection.srt

18.2 KB

20. Installing XCAT and preventing injection attacks.mp4

65.7 MB

20. Installing XCAT and preventing injection attacks.srt

7.7 KB

21. Reflected XSS.mp4

56.3 MB

21. Reflected XSS.srt

13.0 KB

22. Stored XSS.mp4

73.6 MB

22. Stored XSS.srt

14.7 KB

23. Changing HTML code with XSS.mp4

38.1 MB

23. Changing HTML code with XSS.srt

8.6 KB

24. XSSer and XSSsniper.mp4

122.6 MB

24. XSSer and XSSsniper.srt

17.1 KB

/.../7. WPA2 Wireless Cracking/

1. Wireless attacking theory.mp4

46.9 MB

1. Wireless attacking theory.srt

14.3 KB

2. Enabling monitor mode.mp4

71.0 MB

2. Enabling monitor mode.srt

6.2 KB

3. Capturing handshake with airodump.mp4

213.9 MB

3. Capturing handshake with airodump.srt

17.9 KB

4. RockYou.txt.mp4

122.6 MB

4. RockYou.txt.srt

16.3 KB

5. Cracking with Aircrack.mp4

106.2 MB

5. Cracking with Aircrack.srt

18.2 KB

6. Cracking with Hashcat.mp4

149.3 MB

6. Cracking with Hashcat.srt

18.6 KB

7. Creating password lists with Crunch.mp4

145.0 MB

7. Creating password lists with Crunch.srt

23.2 KB

8. Creating password lists with Cupp.mp4

55.8 MB

8. Creating password lists with Cupp.srt

9.3 KB

9. Rainbow tables part 1.mp4

121.0 MB

9. Rainbow tables part 1.srt

20.6 KB

10. Rainbow tables part 2.mp4

55.1 MB

10. Rainbow tables part 2.srt

7.2 KB

11. Installing Fluxion.mp4

53.8 MB

11. Installing Fluxion.srt

9.0 KB

12. Finding and cracking hidden networks.mp4

116.5 MB

12. Finding and cracking hidden networks.srt

11.7 KB

13. Preventing wireless attacks.mp4

53.9 MB

13. Preventing wireless attacks.srt

10.4 KB

/.../8. Man in the Middle Attacks/

1. ARP protocol basics.mp4

73.7 MB

1. ARP protocol basics.srt

13.4 KB

2. Man in the middle attack theory.mp4

26.9 MB

2. Man in the middle attack theory.srt

9.3 KB

3. Installing MITMf.mp4

93.4 MB

3. Installing MITMf.srt

9.3 KB

4. Manual ARP spoofing.mp4

131.0 MB

4. Manual ARP spoofing.srt

18.5 KB

5. Problems while installing MITMf.mp4

72.0 MB

5. Problems while installing MITMf.srt

9.0 KB

6. HTTP traffic sniffing.mp4

94.7 MB

6. HTTP traffic sniffing.srt

11.7 KB

7. DNS spoofing and HTTPS password sniffing.mp4

273.6 MB

7. DNS spoofing and HTTPS password sniffing.srt

30.4 KB

8. Hooking browsers with BEEF.mp4

141.6 MB

8. Hooking browsers with BEEF.srt

21.0 KB

9. Screenshotting targets browser.mp4

127.7 MB

9. Screenshotting targets browser.srt

14.6 KB

10. Cloning any webpage.mp4

79.2 MB

10. Cloning any webpage.srt

11.9 KB

11. Ettercap basics.mp4

37.5 MB

11. Ettercap basics.srt

9.6 KB

/9. System Hacking/

1. MSFconsole environment.mp4

135.1 MB

1. MSFconsole environment.srt

22.2 KB

2. Metasploit modules explained.mp4

83.0 MB

2. Metasploit modules explained.srt

16.3 KB

3. Bruteforcing SSH with Metasploit.mp4

176.3 MB

3. Bruteforcing SSH with Metasploit.srt

20.6 KB

4. Attacking Tomcat with Metasploit.mp4

99.2 MB

4. Attacking Tomcat with Metasploit.srt

11.6 KB

5. Getting Meterpreter with command injection.mp4

225.7 MB

5. Getting Meterpreter with command injection.srt

32.4 KB

6. PHP code injection.mp4

63.6 MB

6. PHP code injection.srt

8.0 KB

7. 2 Metasploitable exploits.mp4

64.4 MB

7. 2 Metasploitable exploits.srt

9.7 KB

8. Wine installation.mp4

109.2 MB

8. Wine installation.srt

15.7 KB

9. Creating Windows payloads with Msfvenom.mp4

95.7 MB

9. Creating Windows payloads with Msfvenom.srt

12.8 KB

10. Encoders and Hex editor.mp4

149.6 MB

10. Encoders and Hex editor.srt

24.9 KB

11. Windows 10 Meterpreter shell.mp4

120.1 MB

11. Windows 10 Meterpreter shell.srt

16.9 KB

12. Meterpreter environment.mp4

135.8 MB

12. Meterpreter environment.srt

16.9 KB

13. Windows 10 privilege escalation.mp4

106.1 MB

13. Windows 10 privilege escalation.srt

16.8 KB

14. Preventing privilege escalation.mp4

79.3 MB

14. Preventing privilege escalation.srt

8.3 KB

15. Post exploitation modules.mp4

115.3 MB

15. Post exploitation modules.srt

18.4 KB

16. Getting Meterpreter over Internet with port forwarding.mp4

102.4 MB

16. Getting Meterpreter over Internet with port forwarding.srt

13.0 KB

17. Eternalblue exploit.mp4

193.7 MB

17. Eternalblue exploit.srt

25.2 KB

18. Persistence module.mp4

143.6 MB

18. Persistence module.srt

15.1 KB

19. Hacking over the internet with Ngrok.mp4

73.4 MB

19. Hacking over the internet with Ngrok.srt

13.1 KB

20. Android device attack with Venom.mp4

116.4 MB

20. Android device attack with Venom.srt

13.8 KB

21. The real hacking begins now!.mp4

43.1 MB

21. The real hacking begins now!.srt

3.4 KB

/.../10. Python Crash Course/

1. Variables.mp4

67.0 MB

1. Variables.srt

17.7 KB

2. Raw input.mp4

36.9 MB

2. Raw input.srt

14.5 KB

3. If-else statements.mp4

36.8 MB

3. If-else statements.srt

12.8 KB

4. For loops.mp4

23.1 MB

4. For loops.srt

8.3 KB

5. While loops.mp4

30.7 MB

5. While loops.srt

10.1 KB

6. Python lists.mp4

28.4 MB

6. Python lists.srt

10.8 KB

7. Functions.mp4

63.5 MB

7. Functions.srt

19.0 KB

8. Classes.mp4

40.5 MB

8. Classes.srt

13.7 KB

9. Importing libraries.mp4

34.6 MB

9. Importing libraries.srt

9.3 KB

10. Files in Python.mp4

51.2 MB

10. Files in Python.srt

15.9 KB

11. Try and except rule.mp4

28.5 MB

11. Try and except rule.srt

6.3 KB

/.../11. Coding an Advanced Backdoor/

1. Theory behind reverse shells.mp4

27.8 MB

1. Theory behind reverse shells.srt

8.8 KB

2. Simple server code.mp4

60.2 MB

2. Simple server code.srt

16.0 KB

3. Connection with reverse shell.mp4

45.7 MB

3. Connection with reverse shell.srt

9.4 KB

4. Sending and receiving messages.mp4

69.9 MB

4. Sending and receiving messages.srt

14.3 KB

5. Sending messages with while true loop.mp4

56.6 MB

5. Sending messages with while true loop.srt

10.9 KB

6. Executing commands on target system.mp4

67.1 MB

6. Executing commands on target system.srt

11.8 KB

7. Fixing backdoor bugs and adding functions.mp4

146.6 MB

7. Fixing backdoor bugs and adding functions.srt

26.2 KB

8. First test using our backdoor.mp4

133.9 MB

8. First test using our backdoor.srt

25.4 KB

9. Trying to connect every 20 seconds.mp4

96.4 MB

9. Trying to connect every 20 seconds.srt

16.5 KB

10. Creating persistence part 1.mp4

56.8 MB

10. Creating persistence part 1.srt

8.3 KB

11. Creating persistence part 2.mp4

130.2 MB

11. Creating persistence part 2.srt

21.5 KB

12. Changing directory.mp4

87.0 MB

12. Changing directory.srt

15.2 KB

13. Uploading and downloading files.mp4

218.1 MB

13. Uploading and downloading files.srt

28.2 KB

14. Downloading files from the internet.mp4

162.0 MB

14. Downloading files from the internet.srt

29.1 KB

15. Starting programs using our backdoor.mp4

48.1 MB

15. Starting programs using our backdoor.srt

8.9 KB

16. Capturing screenshot on the target PC.mp4

154.7 MB

16. Capturing screenshot on the target PC.srt

22.3 KB

17. Embedding backdoor in an image part 1.mp4

96.3 MB

17. Embedding backdoor in an image part 1.srt

16.2 KB

18. Embedding backdoor in an image part 2.mp4

89.8 MB

18. Embedding backdoor in an image part 2.srt

11.1 KB

19. Checking for administrator privileges.mp4

70.5 MB

19. Checking for administrator privileges.srt

15.4 KB

20. Adding help option.mp4

63.5 MB

20. Adding help option.srt

10.0 KB

/.../12. Creating a Keylogger for the Backdoor/

1. Importing Pynput.mp4

45.2 MB

1. Importing Pynput.srt

13.7 KB

2. Simple keylogger.mp4

50.2 MB

2. Simple keylogger.srt

12.1 KB

3. Adding report function.mp4

57.3 MB

3. Adding report function.srt

13.1 KB

4. Writing keystrokes to a file.mp4

77.2 MB

4. Writing keystrokes to a file.srt

16.7 KB

5. Adding the keylogger to our reverse shell part 1.mp4

167.1 MB

5. Adding the keylogger to our reverse shell part 1.srt

26.3 KB

6. Adding the keylogger to our reverse shell part 2.mp4

47.6 MB

6. Adding the keylogger to our reverse shell part 2.srt

9.0 KB

7. Final project test.mp4

132.9 MB

7. Final project test.srt

18.4 KB

/.../13. Basic Authentication Bruteforcer/

1. Printing banner.mp4

62.9 MB

1. Printing banner.srt

15.3 KB

2. Adding available options.mp4

60.1 MB

2. Adding available options.srt

14.1 KB

3. Starting threads for bruteforce.mp4

45.7 MB

3. Starting threads for bruteforce.srt

10.7 KB

4. Writing function to run the attack.mp4

68.3 MB

4. Writing function to run the attack.srt

14.3 KB

5. Bruteforcing router login.mp4

51.6 MB

5. Bruteforcing router login.srt

12.0 KB

6. Bypassing antivirus with your future programs.mp4

108.8 MB

6. Bypassing antivirus with your future programs.srt

17.3 KB

7. Sending malware with spoofed email.mp4

81.7 MB

7. Sending malware with spoofed email.srt

20.2 KB

/.../14. BONUS - Building a Career in Cyber Security/

1. What will you learn in this section.mp4

4.9 MB

1. What will you learn in this section.srt

3.4 KB

2. Why is ethical hacking a valuable skill.mp4

47.8 MB

2. Why is ethical hacking a valuable skill.srt

31.3 KB

3. What is the best ethical hacking certification.mp4

177.2 MB

3. What is the best ethical hacking certification.srt

22.5 KB

4. Tips for getting your first job as an ethical hacker.mp4

136.3 MB

4. Tips for getting your first job as an ethical hacker.srt

26.4 KB

5. How I started my career as an ethical hacker.mp4

135.9 MB

5. How I started my career as an ethical hacker.srt

19.8 KB

6. How to price your work.mp4

27.3 MB

6. How to price your work.srt

15.2 KB

/1. Introduction/

1. Teaser.mp4

107.0 MB

1. Teaser.srt

9.2 KB

2. Course Introduction.mp4

148.4 MB

2. Course Introduction.srt

8.1 KB

3. Introduction to Python Programming & Ethical Hacking.mp4

146.4 MB

3. Introduction to Python Programming & Ethical Hacking.srt

8.4 KB

4. Lab Overview & Needed Software.mp4

111.6 MB

4. Lab Overview & Needed Software.srt

9.9 KB

4.1 Virtual Box Download Page.html

0.1 KB

5. Installing Kali 2019 as a virtual Machine.mp4

140.4 MB

5. Installing Kali 2019 as a virtual Machine.srt

13.9 KB

5.1 Kali 2019 Download Link 2 (64bit).html

0.1 KB

5.2 How to Fix Blank Screen After Starting Kali.html

0.2 KB

5.2 How to Fix Missing Nat Network Issue.html

0.1 KB

5.3 How to Fix Blank Screen After Starting Kali.html

0.2 KB

5.3 Kali 2019 Download Link (64bit).html

0.2 KB

5.4 Kali 2019 Download Link (32bits).html

0.1 KB

5.4 Kali 2019 Download Link (64bit).html

0.2 KB

5.5 How to Fix Missing Nat Network Issue.html

0.1 KB

5.5 Kali 2019 Download Link (32bits).html

0.1 KB

6. Basic Overview of Kali Linux.mp4

112.7 MB

6. Basic Overview of Kali Linux.srt

6.7 KB

6.1 How to connect a usb device to Kali.html

0.1 KB

7. The Terminal & Linux Commands.mp4

234.3 MB

7. The Terminal & Linux Commands.srt

14.2 KB

7.1 List of Linux Commands.html

0.1 KB

8. Python 2 VS Python 3 & Writing Our First Program.mp4

203.1 MB

8. Python 2 VS Python 3 & Writing Our First Program.srt

11.8 KB

9. Installing & Using a Python IDE.mp4

121.1 MB

9. Installing & Using a Python IDE.srt

11.6 KB

9.1 Pycharm Download Link.html

0.1 KB

/.../2. Writing a MAC Address Changer - Python Basics/

1. What is MAC Address & How To Change it.mp4

110.4 MB

1. What is MAC Address & How To Change it.srt

9.5 KB

1.1 mac_changer.pdf.pdf

1.0 MB

2. Using Python Modules & Executing System Commands.mp4

22.7 MB

2. Using Python Modules & Executing System Commands.srt

12.6 KB

2.1 Subprocess Module Documentation.html

0.1 KB

3. Implementing a Very Basic MAC Changer.mp4

9.8 MB

3. Implementing a Very Basic MAC Changer.srt

6.8 KB

4. Variables & Strings.mp4

20.4 MB

4. Variables & Strings.srt

12.6 KB

4.1 More info About Variables in Python.html

0.1 KB

4.2 More info About Strings in Python.html

0.1 KB

5. Using Variables in MAC Changer.mp4

9.6 MB

5. Using Variables in MAC Changer.srt

5.8 KB

6. Getting Input From The User.mp4

12.9 MB

6. Getting Input From The User.srt

7.9 KB

6.1 More info about Python Built-in Functions.html

0.1 KB

7. Handling User Input.mp4

15.9 MB

7. Handling User Input.srt

12.0 KB

8. Handling Command-line Arguments.mp4

18.9 MB

8. Handling Command-line Arguments.srt

11.7 KB

8.1 Optparse Documentation Page.html

0.1 KB

9. Initialising Variables Based on Command-line Arguments.mp4

12.8 MB

9. Initialising Variables Based on Command-line Arguments.srt

9.3 KB

10. Python Functions.mp4

23.6 MB

10. Python Functions.srt

12.4 KB

10.1 More info on Python Functions.html

0.1 KB

11. Returning Values From Functions.mp4

11.2 MB

11. Returning Values From Functions.srt

8.7 KB

12. Decision Making in Python.mp4

17.5 MB

12. Decision Making in Python.srt

9.2 KB

12.1 More info on Decision Making.html

0.1 KB

13. Using Conditional Statements in MAC Changer.mp4

20.9 MB

13. Using Conditional Statements in MAC Changer.srt

11.2 KB

/.../3. MAC Changer - Algorithm Design/

1. Introduction to Algorithms.mp4

7.4 MB

1. Introduction to Algorithms.srt

4.6 KB

2. Reading Output Returned By System Commands.mp4

15.2 MB

2. Reading Output Returned By System Commands.srt

8.6 KB

2.1 Check_call() Manuall Page.html

0.1 KB

3. Introduction to Regular Expressions (Regex).mp4

18.9 MB

3. Introduction to Regular Expressions (Regex).srt

10.8 KB

3.1 More info on Regular Expressions.html

0.1 KB

3.1 Pythex.org.html

0.1 KB

3.2 More info on Regular Expressions.html

0.1 KB

3.2 Pythex.org.html

0.1 KB

4. Extracting a Substring Using Regex.mp4

16.6 MB

4. Extracting a Substring Using Regex.srt

8.3 KB

4.1 Re Module Manual Page.html

0.1 KB

5. Refactoring & Housekeeping.mp4

18.5 MB

5. Refactoring & Housekeeping.srt

15.5 KB

6. Implementing The Validation Algorithm.mp4

13.3 MB

6. Implementing The Validation Algorithm.srt

8.4 KB

/.../4. Programming a Network Scanner/

1. Introduction & Teaser.mp4

115.0 MB

1. Introduction & Teaser.srt

12.7 KB

1.1 Best Wireless Adapters To Use With Kali.html

0.1 KB

1.1 network_scanner.pdf.pdf

736.4 KB

1.2 Website That Sells Supported Wireless Adapters.html

0.1 KB

1.3 Best Wireless Adapters To Use With Kali.html

0.1 KB

1.3 network_scanner.pdf.pdf

736.4 KB

2. Installing Windows as a Virtual Machine.mp4

63.5 MB

2. Installing Windows as a Virtual Machine.srt

4.9 KB

2.1 Windows Virtual Image Download Link.html

0.1 KB

3. Introduction to ARP.mp4

17.4 MB

3. Introduction to ARP.srt

12.2 KB

3.1 More info about Scapy ARP Ping.html

0.1 KB

3.1 Scapy Documentation.html

0.1 KB

3.2 More info about Scapy ARP Ping.html

0.1 KB

3.2 Scapy Documentation.html

0.1 KB

4. Designing an Algorithm To Discover Clients on The Same Network.mp4

12.5 MB

4. Designing an Algorithm To Discover Clients on The Same Network.srt

5.1 KB

5. Using Scapy To Create an ARP Request.mp4

12.2 MB

5. Using Scapy To Create an ARP Request.srt

8.6 KB

6. Combining Frames To Broadcast Packets.mp4

22.2 MB

6. Combining Frames To Broadcast Packets.srt

11.5 KB

7. Sending & Receiving Packets.mp4

11.3 MB

7. Sending & Receiving Packets.srt

9.3 KB

7.1 More info about the sr() function.html

0.1 KB

8. Introduction Lists in Python.mp4

20.0 MB

8. Introduction Lists in Python.srt

11.0 KB

8.1 More info about python lists.html

0.1 KB

9. Iterating Over Lists & Analysing Packet.mp4

19.3 MB

9. Iterating Over Lists & Analysing Packet.srt

13.0 KB

10. Using Escape Characters To Improve Program Output.mp4

11.6 MB

10. Using Escape Characters To Improve Program Output.srt

8.3 KB

10.1 Python Escape Characters.html

0.1 KB

11. Introduction to Dictionaries in Python.mp4

16.0 MB

11. Introduction to Dictionaries in Python.srt

13.1 KB

11.1 More info about Python dictionaries.html

0.1 KB

12. Improving the Program Using a List of Dictionaries.mp4

15.5 MB

12. Improving the Program Using a List of Dictionaries.srt

11.7 KB

12.1 More info about python dictionaries.html

0.1 KB

13. Iterating Over Nested Data Structures.mp4

13.2 MB

13. Iterating Over Nested Data Structures.srt

9.5 KB

14. Get IP Range Using Command Line Arguments.html

0.2 KB

15. Python 3 Compatibility.mp4

13.3 MB

15. Python 3 Compatibility.srt

9.5 KB

15.1 argparse Documentation.html

0.1 KB

/.../5. Writing an ARP Spoofer/

1. What is ARP Spoofing.mp4

117.7 MB

1. What is ARP Spoofing.srt

7.1 KB

1.1 arp_spoof.pdf.pdf

726.2 KB

2. Intercepting Data in a Network Using arpspoof.mp4

59.8 MB

2. Intercepting Data in a Network Using arpspoof.srt

6.2 KB

3. Creating an ARP Response.mp4

11.1 MB

3. Creating an ARP Response.srt

9.0 KB

4. Sending ARP Responses.mp4

9.5 MB

4. Sending ARP Responses.srt

7.2 KB

5. Extracting MAC Address From Responses.mp4

11.4 MB

5. Extracting MAC Address From Responses.srt

8.5 KB

6. Introduction to Loops in Python.mp4

17.6 MB

6. Introduction to Loops in Python.srt

11.4 KB

6.1 More info about Python Loops.html

0.1 KB

7. More on Loops & Counters.mp4

12.2 MB

7. More on Loops & Counters.srt

11.0 KB

8. Dynamic Printing.mp4

10.6 MB

8. Dynamic Printing.srt

8.9 KB

9. Exception Handling in Python.mp4

8.2 MB

9. Exception Handling in Python.srt

7.0 KB

9.1 More info About Exceptions.html

0.1 KB

10. Implementing a Restore Function.mp4

21.5 MB

10. Implementing a Restore Function.srt

15.0 KB

11. Restoring ARP Tables on Exception.mp4

9.7 MB

11. Restoring ARP Tables on Exception.srt

6.4 KB

/.../6. Writing a Packet Sniffer/

1. Introduction & Teaser.mp4

90.0 MB

1. Introduction & Teaser.srt

6.3 KB

1.1 Sniffer.pdf.pdf

569.7 KB

2. Sniffing Packets Using Scapy.mp4

12.4 MB

2. Sniffing Packets Using Scapy.srt

10.2 KB

2.1 More info About the Sniff Function.html

0.1 KB

3. Extracting data From a Specific Layer.mp4

17.2 MB

3. Extracting data From a Specific Layer.srt

8.4 KB

3.1 Berkeley Packet Filter (BPF) syntax.html

0.1 KB

3.1 Scapy-http Git Repo.html

0.1 KB

3.2 Berkeley Packet Filter (BPF) syntax.html

0.1 KB

3.2 Scapy-http Git Repo.html

0.1 KB

4. Analysing Sniffed Packets & Extracting Fields From Layers.mp4

125.2 MB

4. Analysing Sniffed Packets & Extracting Fields From Layers.srt

15.0 KB

4.1 HTTP Login Page For Testing.html

0.1 KB

4.2 Another HTTP Login Page For Testing.html

0.1 KB

5. Analysing Fields & Extracting Passwords.mp4

22.2 MB

5. Analysing Fields & Extracting Passwords.srt

14.1 KB

6. Extracting URLs.mp4

21.4 MB

6. Extracting URLs.srt

9.4 KB

7. Capturing Passwords From Any Computer Connected to the Same Network.mp4

15.9 MB

7. Capturing Passwords From Any Computer Connected to the Same Network.srt

9.7 KB

/.../7. Writing a DNS Spoofer/

1. Intercepting Packets - Creating a Proxy.mp4

162.7 MB

1. Intercepting Packets - Creating a Proxy.srt

16.5 KB

1.1 interceptor.pdf.pdf

1.9 MB

2. Converting Packets to Scapy Packets.mp4

88.0 MB

2. Converting Packets to Scapy Packets.srt

10.9 KB

3. Introduction to DNS Spoofing.mp4

129.6 MB

3. Introduction to DNS Spoofing.srt

8.7 KB

4. Filtering DNS Responses.mp4

74.0 MB

4. Filtering DNS Responses.srt

8.1 KB

5. Analysing & Creating a Custom DNS Response.mp4

83.7 MB

5. Analysing & Creating a Custom DNS Response.srt

10.0 KB

6. Modifying Packets On The Fly.mp4

91.1 MB

6. Modifying Packets On The Fly.srt

9.7 KB

7. Redirecting DNS Responses.mp4

63.9 MB

7. Redirecting DNS Responses.srt

6.9 KB

/.../8. Writing a File Interceptor/

1. Introduction & Teaser.mp4

76.5 MB

1. Introduction & Teaser.srt

5.6 KB

2. Filtering Traffic Based on the Port Used.mp4

97.7 MB

2. Filtering Traffic Based on the Port Used.srt

11.0 KB

3. Analysing HTTP Requests.mp4

58.3 MB

3. Analysing HTTP Requests.srt

6.9 KB

4. Intercepting HTTP Requests.mp4

109.3 MB

4. Intercepting HTTP Requests.srt

12.1 KB

5. Modifying HTTP Responses on The Fly.mp4

107.7 MB

5. Modifying HTTP Responses on The Fly.srt

12.9 KB

5.1 List of HTTP Responses.html

0.1 KB

6. Intercepting & Replacing Downloads on The Network.mp4

105.4 MB

6. Intercepting & Replacing Downloads on The Network.srt

11.6 KB

/.../9. Writing a Code Injector/

1. Introduction & Teaser.mp4

31.6 MB

1. Introduction & Teaser.srt

1.7 KB

2. Analysing HTTP Responses.mp4

81.7 MB

2. Analysing HTTP Responses.srt

8.4 KB

3. Replacing a Substring Using Regex.mp4

67.8 MB

3. Replacing a Substring Using Regex.srt

8.4 KB

4. Decoding HTTP Responses.mp4

109.3 MB

4. Decoding HTTP Responses.srt

12.1 KB

5. Modifying HTTP Responses & Injecting Javascript Code in HTML Pages.mp4

118.6 MB

5. Modifying HTTP Responses & Injecting Javascript Code in HTML Pages.srt

10.4 KB

6. Refactoring & Housekeeping.mp4

82.9 MB

6. Refactoring & Housekeeping.srt

11.0 KB

7. Debugging Issues in Python.mp4

79.0 MB

7. Debugging Issues in Python.srt

7.7 KB

8. Using Groups & None-capturing Regex.mp4

97.6 MB

8. Using Groups & None-capturing Regex.srt

11.1 KB

9. Recalculating Content Length.mp4

130.5 MB

9. Recalculating Content Length.srt

13.4 KB

10. BeEF Overview & Basic Hook Method.mp4

155.7 MB

10. BeEF Overview & Basic Hook Method.srt

14.6 KB

11. Hooking Computers Using code_injector.mp4

50.8 MB

11. Hooking Computers Using code_injector.srt

7.2 KB

12. Basic BeEF Commands.mp4

55.5 MB

12. Basic BeEF Commands.srt

6.1 KB

13. Delivering Malware Using BeEF.mp4

73.4 MB

13. Delivering Malware Using BeEF.srt

7.7 KB

/.../10. Bypassing HTTPS/

1. How to Bypass HTTPS.mp4

171.6 MB

1. How to Bypass HTTPS.srt

13.2 KB

1.1 Moxie explaining how SSLstrip works.html

0.1 KB

2. Bypassing HTTPS & Sniffing Login Credentials.mp4

71.0 MB

2. Bypassing HTTPS & Sniffing Login Credentials.srt

10.0 KB

3. Replacing Downloads on HTTPS Pages.mp4

121.6 MB

3. Replacing Downloads on HTTPS Pages.srt

13.3 KB

4. Injecting Code in HTTPS Pages.mp4

105.1 MB

4. Injecting Code in HTTPS Pages.srt

10.1 KB

/.../11. Writing an ARP Spoof Detector/

1. Running Python Programs on Windows.mp4

112.0 MB

1. Running Python Programs on Windows.srt

12.7 KB

2. Capturing & Analysing ARP Responses.mp4

58.3 MB

2. Capturing & Analysing ARP Responses.srt

8.2 KB

3. Detecting ARP Spoofing Attacks Using Python.mp4

71.1 MB

3. Detecting ARP Spoofing Attacks Using Python.srt

9.2 KB

/.../12. Writing Malware/

1. Introduction & Teaser.mp4

46.2 MB

1. Introduction & Teaser.srt

2.4 KB

1.1 Evil Files.pdf.pdf

1.4 MB

2. Execute System Command Payload.mp4

95.7 MB

2. Execute System Command Payload.srt

12.3 KB

3. Sending Emails Using Python.mp4

94.3 MB

3. Sending Emails Using Python.srt

14.0 KB

3.1 smtplib Documentation.html

0.1 KB

4. Filtering Command Output Using Regex.mp4

95.0 MB

4. Filtering Command Output Using Regex.srt

13.0 KB

5. Stealing WiFi Passwords Saved on a Computer.mp4

124.2 MB

5. Stealing WiFi Passwords Saved on a Computer.srt

12.4 KB

6. Downloading Files Using Python.mp4

94.0 MB

6. Downloading Files Using Python.srt

10.2 KB

7. Writing Files on Disk.mp4

72.5 MB

7. Writing Files on Disk.srt

14.5 KB

7.1 File Modes In Python.html

0.1 KB

8. Password Recovery Basics.mp4

98.3 MB

8. Password Recovery Basics.srt

11.0 KB

8.1 LaZagne Git Repo.html

0.1 KB

9. Stealing Saved Passwords From Remote Computers.mp4

65.8 MB

9. Stealing Saved Passwords From Remote Computers.srt

10.3 KB

10. Interacting With The File System Using Python.mp4

80.6 MB

10. Interacting With The File System Using Python.srt

12.4 KB

10.1 OS Library Documentation.html

0.1 KB

/.../13. Writing Malware - Keylogger/

1. Introduction & Teaser.mp4

66.3 MB

1. Introduction & Teaser.srt

4.7 KB

2. Writing a Basic Local Keylogger Using Python.mp4

82.1 MB

2. Writing a Basic Local Keylogger Using Python.srt

13.4 KB

2.1 Pynput Documentation.html

0.1 KB

3. Introduction to Global Variables.mp4

57.5 MB

3. Introduction to Global Variables.srt

10.5 KB

4. Logging Special Keys.mp4

57.6 MB

4. Logging Special Keys.srt

8.4 KB

5. Introduction to Threading & Recursion in Python.mp4

88.5 MB

5. Introduction to Threading & Recursion in Python.srt

13.8 KB

5.1 Threading Documentation.html

0.1 KB

6. Introduction Object Oriented Programming.mp4

122.1 MB

6. Introduction Object Oriented Programming.srt

19.4 KB

6.1 More info About Objects in Python.html

0.1 KB

7. Constructor Methods & Instance Variables.mp4

69.3 MB

7. Constructor Methods & Instance Variables.srt

9.6 KB

8. Logging Key-strikes and Reporting Them By Email.mp4

87.9 MB

8. Logging Key-strikes and Reporting Them By Email.srt

14.9 KB

/.../14. Writing Malware - Backdoors/

1. Introduction & Teaser.mp4

80.4 MB

1. Introduction & Teaser.srt

7.5 KB

2. Client - Server Communication & Connection Types.mp4

126.0 MB

2. Client - Server Communication & Connection Types.srt

10.2 KB

3. Connecting Two Remote Computers Using Sockets.mp4

70.0 MB

3. Connecting Two Remote Computers Using Sockets.srt

13.2 KB

3.1 Sockets Official Documentation.html

0.1 KB

3.2 Tutorials Point Socket Documentation.html

0.1 KB

4. Sending & Receiving Data Over TCP.mp4

33.7 MB

4. Sending & Receiving Data Over TCP.srt

6.6 KB

5. Executing System Commands Remotely.mp4

76.9 MB

5. Executing System Commands Remotely.srt

12.5 KB

6. Implementing a Server.mp4

55.0 MB

6. Implementing a Server.srt

10.8 KB

7. Implementing Skeleton For Server - Client Communication.mp4

57.4 MB

7. Implementing Skeleton For Server - Client Communication.srt

8.8 KB

8. Refactoring - Creating a Listener Class.mp4

75.4 MB

8. Refactoring - Creating a Listener Class.srt

9.8 KB

9. Refactoring - Creating a Backdoor Class.mp4

45.5 MB

9. Refactoring - Creating a Backdoor Class.srt

7.0 KB

10. Serialisation - Theory.mp4

172.4 MB

10. Serialisation - Theory.srt

14.0 KB

11. Serialisation - Implementing Reliable Methods to Send & Receive Data Over TCP.mp4

85.9 MB

11. Serialisation - Implementing Reliable Methods to Send & Receive Data Over TCP.srt

9.6 KB

11.1 json Documentation.html

0.1 KB

12. Serialisation - Reliably Sending & Receiving Data.mp4

61.8 MB

12. Serialisation - Reliably Sending & Receiving Data.srt

7.4 KB

13. Sending Commands as List & Implementing Exit Command.mp4

76.7 MB

13. Sending Commands as List & Implementing Exit Command.srt

10.2 KB

14. Interacting With the File System - Implementing cd Command.mp4

81.5 MB

14. Interacting With the File System - Implementing cd Command.srt

10.9 KB

15. Reading Files Using Python.mp4

77.4 MB

15. Reading Files Using Python.srt

9.1 KB

16. Writing Files Using Python.mp4

59.4 MB

16. Writing Files Using Python.srt

8.3 KB

17. Downloading Files From Hacked Computer.mp4

81.0 MB

17. Downloading Files From Hacked Computer.srt

8.5 KB

18. Implementing Upload Functionality in Listener.mp4

102.6 MB

18. Implementing Upload Functionality in Listener.srt

9.2 KB

19. Implementing Upload Functionality in Backdoor.mp4

64.7 MB

19. Implementing Upload Functionality in Backdoor.srt

7.3 KB

20. Handling Unknown Exceptions.mp4

102.6 MB

20. Handling Unknown Exceptions.srt

11.8 KB

21. Using the Backdoor to Hack Windows, Linux & OS X.mp4

133.2 MB

21. Using the Backdoor to Hack Windows, Linux & OS X.srt

15.1 KB

/.../15. Writing Malware - Packaging/

1. Introduction & Teaser.mp4

71.6 MB

1. Introduction & Teaser.srt

4.2 KB

2. Converting Python Programs To Windows Binary Executables.mp4

86.0 MB

2. Converting Python Programs To Windows Binary Executables.srt

8.4 KB

3. Running Executables Silentely.mp4

69.8 MB

3. Running Executables Silentely.srt

8.5 KB

4. Installing Windows Pyinstaller on Linux.mp4

70.5 MB

4. Installing Windows Pyinstaller on Linux.srt

9.3 KB

4.1 Python 2.7.14 Download Page.html

0.1 KB

5. Packaging Programs For Windows From Linux.mp4

61.0 MB

5. Packaging Programs For Windows From Linux.srt

10.3 KB

6. Introduction to Persistence.mp4

109.5 MB

6. Introduction to Persistence.srt

10.0 KB

7. Running Programs on Startup.mp4

124.8 MB

7. Running Programs on Startup.srt

17.2 KB

7.1 Python OS Library Documentation.html

0.1 KB

7.2 Python Shutil Library Documentation.html

0.1 KB

8. Creating a Basic Trojan Using Download & Execute Payload.mp4

99.1 MB

8. Creating a Basic Trojan Using Download & Execute Payload.srt

13.5 KB

9. Creating a Trojan By Embedding Files In Program Code.mp4

64.5 MB

9. Creating a Trojan By Embedding Files In Program Code.srt

10.2 KB

9.1 Pyinstaller Documentation.html

0.1 KB

10. Bypassing Anti-Virus Programs - Theory.mp4

85.1 MB

10. Bypassing Anti-Virus Programs - Theory.srt

6.7 KB

10.1 BypassAVDynamics.pdf.pdf

1.1 MB

10.2 Evading-AV.pdf.pdf

835.2 KB

11. Bypassing Anti-Virus Programs - Practical.mp4

85.3 MB

11. Bypassing Anti-Virus Programs - Practical.srt

10.8 KB

11.1 Nodistribute.html

0.1 KB

11.2 UPX Download Page.html

0.1 KB

11.3 Alternative to Nodistribute.html

0.1 KB

12. Adding an Icon to Generated Executables.mp4

46.6 MB

12. Adding an Icon to Generated Executables.srt

6.1 KB

12.1 Easyicon - a website to convert images to icons.html

0.1 KB

12.2 Iconfinder - a website to download icons.html

0.1 KB

13. Spoofing File Extension.mp4

153.2 MB

13. Spoofing File Extension.srt

11.1 KB

14. Converting Python Programs To OS X Executables.mp4

108.5 MB

14. Converting Python Programs To OS X Executables.srt

11.0 KB

14.1 get-pip.py link.html

0.1 KB

15. Converting Python Programs to Linux Executables.mp4

64.7 MB

15. Converting Python Programs to Linux Executables.srt

9.9 KB

/.../16. Website Web Application Hacking/

1. Introduction & Teaser.mp4

143.1 MB

1. Introduction & Teaser.srt

9.2 KB

1.1 Website Hacking.pdf.pdf

354.6 KB

2. What is a Website.mp4

90.2 MB

2. What is a Website.srt

5.6 KB

3. How to Hack a Website.mp4

108.1 MB

3. How to Hack a Website.srt

8.1 KB

/.../17. Website Hacking - Writing a Crawler/

1. Sending GET Requests To Web Servers.mp4

99.0 MB

1. Sending GET Requests To Web Servers.srt

11.7 KB

1.1 Python Requests.html

0.1 KB

2. Discovering Website Subdomains Using Python.mp4

106.2 MB

2. Discovering Website Subdomains Using Python.srt

12.9 KB

2.1 subdomains-wodlist.txt.txt

6.9 MB

3. Discovering Hidden Paths in Websites.mp4

143.5 MB

3. Discovering Hidden Paths in Websites.srt

13.1 KB

3.1 files-and-dirs-wordlist.txt.txt

35.8 KB

4. Reading Response Content.mp4

95.9 MB

4. Reading Response Content.srt

7.8 KB

5. Extracting Useful Data From Response.mp4

118.2 MB

5. Extracting Useful Data From Response.srt

8.5 KB

6. Filtering Rsults.mp4

117.5 MB

6. Filtering Rsults.srt

8.7 KB

7. Extracting Unique Links & Storing Them In a List.mp4

101.1 MB

7. Extracting Unique Links & Storing Them In a List.srt

7.9 KB

8. Recursively Discovering All Paths On a Target Website.mp4

111.4 MB

8. Recursively Discovering All Paths On a Target Website.srt

12.1 KB

/.../18. Writing a Program To Guess Login Information/

1. Sending Post Requests to Websites.mp4

111.4 MB

1. Sending Post Requests to Websites.srt

14.4 KB

2. Guessing Login Information on Login Pages.mp4

96.0 MB

2. Guessing Login Information on Login Pages.srt

11.0 KB

2.1 passwords.txt.txt

0.5 KB

/.../19. Writing a Vulnerability Scanner/

1. Introduction & Teaser.mp4

46.7 MB

1. Introduction & Teaser.srt

3.4 KB

2. HTTP Requests - POST VS GET.mp4

93.6 MB

2. HTTP Requests - POST VS GET.srt

8.2 KB

3. Parsing HTML Code Using Python.mp4

99.9 MB

3. Parsing HTML Code Using Python.srt

9.0 KB

3.1 Beautiful Soup Documentation.html

0.1 KB

4. Extracting HTML Attributes.mp4

144.3 MB

4. Extracting HTML Attributes.srt

12.0 KB

5. Posting Forms.mp4

142.8 MB

5. Posting Forms.srt

10.9 KB

6. Building Basic Structure For a Vulnerability Scanner.mp4

124.8 MB

6. Building Basic Structure For a Vulnerability Scanner.srt

14.2 KB

7. Using Default Parameters.mp4

43.4 MB

7. Using Default Parameters.srt

6.1 KB

8. Sending Requests in a Session.mp4

87.3 MB

8. Sending Requests in a Session.srt

10.5 KB

9. Extracting & Submitting Forms Automatically.mp4

130.9 MB

9. Extracting & Submitting Forms Automatically.srt

11.5 KB

10. Implementing a Method To Run The Scanner.mp4

61.8 MB

10. Implementing a Method To Run The Scanner.srt

7.2 KB

11. Discovering XSS Vulnerabilities.mp4

155.0 MB

11. Discovering XSS Vulnerabilities.srt

11.7 KB

12. Exploiting XSS Vulnerabilities.mp4

100.7 MB

12. Exploiting XSS Vulnerabilities.srt

6.3 KB

13. Implementing Code To Discover XSS in Forms.mp4

99.6 MB

13. Implementing Code To Discover XSS in Forms.srt

8.8 KB

14. Implementing Code To Discover XSS in Parameters.mp4

75.3 MB

14. Implementing Code To Discover XSS in Parameters.srt

8.6 KB

15. Automatically Discovering Vulnerabilities Using the Vulnerability Scanner.mp4

94.2 MB

15. Automatically Discovering Vulnerabilities Using the Vulnerability Scanner.srt

10.5 KB

/.../20. Bonus Section/

1. Bonus Lecture - What's Next.html

6.6 KB

/1. Introduction/

1. Introduction and Course Overview.mp4

10.8 MB

2. A Day in the Life of an Ethical Hacker.mp4

42.9 MB

/2. Note Keeping/

1. Part 1 Effective Note Keeping.mp4

46.6 MB

2. Part 2 Important Tools.mp4

40.6 MB

/3. Networking Refresher/

1. Introduction.mp4

4.7 MB

2. IP Addresses.mp4

82.1 MB

3. MAC Addresses.mp4

30.1 MB

4. TCP, UDP, and the Three-Way Handshake.mp4

22.8 MB

5. Common Ports and Protocols.mp4

17.5 MB

6. The OSI Model.mp4

13.2 MB

7. Subnetting Part 1 - Methodology.mp4

132.6 MB

8. Subnetting Part 2 - Hands-On Challenge.mp4

34.9 MB

9. Building a Network with Packet Tracer.mp4

91.4 MB

/.../4. Setting Up Our Lab/

1. Installing VMWare Virtualbox.mp4

57.5 MB

1.1 Oracle VirtualBox.html

0.1 KB

1.2 VMWare Workstation Player.html

0.1 KB

2. Installing Kali Linux.mp4

47.4 MB

2.1 Kali Linux Download.html

0.1 KB

/.../5. Introduction to Linux/

1. Exploring Kali Linux.mp4

73.7 MB

2. Navigating the File System.mp4

118.9 MB

3. Users and Privileges.mp4

98.7 MB

4. Common Network Commands.mp4

66.8 MB

5. Viewing, Creating, and Editing Files.mp4

41.8 MB

6. Starting and Stopping Kali Services.mp4

86.1 MB

7. Installing and Updating Tools.mp4

79.2 MB

8. Scripting with Bash.mp4

139.8 MB

/.../6. Introduction to Python/

1. Introduction.mp4

8.1 MB

2. Strings.mp4

57.7 MB

3. Math.mp4

45.4 MB

4. Variables & Methods.mp4

116.0 MB

5. Functions.mp4

101.9 MB

6. Boolean Expressions.mp4

39.2 MB

7. Releational and Boolean Operators.mp4

78.5 MB

8. Conditional Statements.mp4

128.4 MB

9. Lists.mp4

150.1 MB

10. Tuples.mp4

33.3 MB

11. Looping.mp4

61.6 MB

12. Importing Modules.mp4

53.3 MB

13. Advanced Strings.mp4

152.5 MB

14. Dictionaries.mp4

120.2 MB

15. Sockets.mp4

49.7 MB

16. Building a Port Scanner.mp4

259.6 MB

/.../7. The Ethical Hacker Methodology/

1. The Five Stages of Ethical Hacking.mp4

14.3 MB

/.../8. Information Gathering (Reconnaissance)/

1. Passive Reconnaissance Overview.mp4

22.4 MB

2. Identifying Our Target.mp4

45.0 MB

3. E-Mail Address Gathering with Hunter.io.mp4

21.3 MB

4. Gathering Breached Credentials with Breach-Parse.mp4

73.2 MB

5. Gathering Breached Credentials with WeLeakInfo.mp4

63.2 MB

6. Utilizing theharvester.mp4

53.4 MB

7. Hunting Subdomains - Part 1.mp4

83.4 MB

8. Hunting Subdomains - Part 2.mp4

69.1 MB

9. Identifying Website Technologies.mp4

101.1 MB

10. Information Gathering with Burp Suite.mp4

110.8 MB

11. Google Fu.mp4

61.2 MB

12. Utilizing Social Media.mp4

42.1 MB

/9. Scanning & Enumeration/

1. Installing Kioptrix Level 1.mp4

47.0 MB

2. Scanning with Nmap.mp4

107.3 MB

3. Enumerating HTTPHTTPS - Part 1.mp4

116.6 MB

4. Enumerating HTTPHTTPS - Part 2.mp4

157.9 MB

5. Enumerating SMB.mp4

94.7 MB

6. Enumerating SSH.mp4

32.6 MB

7. Researching Potential Vulnerabilities.mp4

145.3 MB

8. Our Notes, so Far.mp4

16.9 MB

/.../10. Additional Scanning Tools/

1. Scanning with Masscan.mp4

27.7 MB

2. Scanning with Metasploit.mp4

23.8 MB

3. Scanning with Nessus - Part 1.mp4

103.8 MB

4. Scanning with Nessus - Part 2.mp4

53.0 MB

/.../11. Exploitation Basics/

1. Reverse Shells vs Bind Shells.mp4

38.8 MB

2. Staged vs Non-Staged Payloads.mp4

13.3 MB

3. Gaining Root with Metasploit.mp4

56.8 MB

4. Manual Exploitation.mp4

142.9 MB

5. Brute Force Attacks.mp4

97.7 MB

6. Password Spraying and Credential Stuffing.mp4

164.3 MB

7. Our Notes, Revisited.mp4

18.2 MB

/.../12. Mid-Course Capstone/

1. Introduction.mp4

79.6 MB

2. Walkthrough - Legacy.mp4

348.0 MB

3. Walkthrough - Lame.mp4

293.6 MB

3.1 Cracking Linux Hashes with Hashcat.html

0.1 KB

4. Walkthrough - Blue.mp4

298.0 MB

5. Walkthrough - Devel.mp4

258.7 MB

6. Walkthrough - Jerry.mp4

320.2 MB

7. Walkthrough - Nibbles.mp4

299.2 MB

8. Walkthrough - Optimum.mp4

247.0 MB

9. Walkthrough - Bashed.mp4

254.0 MB

10. Walkthrough - Grandpa.mp4

171.2 MB

11. Walkthrough - Netmon.mp4

245.3 MB

/.../13. Introduction to Exploit Development (Buffer Overflows)/

1. Required Installations.mp4

61.3 MB

2. Buffer Overflows Explained.mp4

31.6 MB

3. Spiking.mp4

63.2 MB

4. Fuzzing.mp4

31.0 MB

5. Finding the Offset.mp4

44.2 MB

6. Overwriting the EIP.mp4

17.5 MB

7. Finding Bad Characters.mp4

47.0 MB

8. Finding the Right Module.mp4

69.1 MB

9. Generating Shellcode and Getting Root.mp4

36.8 MB

/.../14. Active Directory Overview/

1. Active Directory Overview.mp4

23.6 MB

2. Physical Active Directory Components.mp4

21.0 MB

3. Logical Active Directory Components.mp4

24.0 MB

/.../15. Active Directory Lab Build/

1. Lab Overview and Requirements.mp4

8.0 MB

2. Downloading Necessary ISOs.mp4

18.7 MB

3. Setting Up the Domain Controller.mp4

79.9 MB

4. Setting Up the User Machines.mp4

37.4 MB

5. Setting Up Users, Groups, and Policies.mp4

104.6 MB

6. Joining Our Machines to the Domain.mp4

83.2 MB

/.../16. Attacking Active Directory Initial Attack Vectors/

1. Introduction.mp4

26.9 MB

2. LLMNR Poisoning Overview.mp4

47.9 MB

3. Capturing NTLMv2 Hashes with Responder.mp4

55.3 MB

4. Password Cracking with Hashcat.mp4

161.8 MB

5. LLMNR Poisoning Defenses.mp4

19.2 MB

6. SMB Relay Attacks Overview.mp4

28.2 MB

7. Quick Lab Update.mp4

9.7 MB

8. Discovering Hosts with SMB Signing Disabled.mp4

44.2 MB

9. SMB Relay Attack Demonstration Part 1.mp4

54.6 MB

10. SMB Relay Attack Demonstration Part 2.mp4

31.0 MB

11. SMB Relay Attack Defenses.mp4

13.3 MB

12. Gaining Shell Access.mp4

64.2 MB

13. IPv6 Attacks Overview.mp4

9.6 MB

14. Installing mitm6.mp4

14.1 MB

15. Setting Up LDAPS.mp4

13.5 MB

16. IPv6 DNS Takeover via mitm6.mp4

91.0 MB

16.1 mitm6 – compromising IPv4 networks via IPv6.html

0.1 KB

16.2 The worst of both worlds Combining NTLM Relaying and Kerberos delegation.html

0.1 KB

17. IPv6 Attack Defenses.mp4

20.9 MB

18. Other Attack Vectors and Strategies.mp4

28.3 MB

/.../17. Attacking Active Directory Post-Compromise Enumeration/

1. Introduction.mp4

3.7 MB

2. PowerView Overview.mp4

21.0 MB

3. Domain Enumeration with PowerView.mp4

146.2 MB

3.1 PowerView Cheat Sheet.html

0.1 KB

4. Bloodhound Overview and Setup.mp4

37.6 MB

5. Grabbing Data with Invoke-Bloodhound.mp4

33.1 MB

6. Enumerating Domain Data with Bloodhound.mp4

36.2 MB

/.../18. Attacking Active Directory Post-Compromise Attacks/

1. Introduction.mp4

2.0 MB

2. Pass the Hash Password Overview.mp4

18.7 MB

3. Installing crackmapexec.mp4

8.6 MB

4. Pass the Password Attacks.mp4

70.5 MB

5. Dumping Hashes with secretsdump.py.mp4

25.2 MB

6. Cracking NTLM Hashes with Hashcat.mp4

28.7 MB

7. Pass the Hash Attacks.mp4

56.2 MB

8. Pass Attack Mitigations.mp4

15.1 MB

9. Token Impersonation Overview.mp4

17.0 MB

10. Token Impersonation with Incognito.mp4

50.5 MB

11. Token Impersonation Mitigation.mp4

15.9 MB

12. Kerberoasting Overview.mp4

27.0 MB

13. Kerberoasting Walkthrough.mp4

45.4 MB

14. Kerberoasting Mitigation.mp4

7.8 MB

15. GPP cPassword Attacks Overview.mp4

22.9 MB

15.1 Pentesting in the Real World Group Policy Pwnage.html

0.1 KB

16. Abusing GPP Part 1.mp4

66.2 MB

17. Abusing GPP Part 2.mp4

43.6 MB

18. Mimikatz Overview.mp4

34.7 MB

18.1 Mimikatz Github.html

0.1 KB

19. Credential Dumping with Mimikatz.mp4

75.9 MB

20. Golden Ticket Attacks.mp4

54.9 MB

21. Conclusion and Additional Resources.mp4

73.4 MB

21.1 Pentester Academy Red Team Labs.html

0.1 KB

21.2 Pentester Academy Active Directory Labs.html

0.1 KB

21.3 eLearnSecurity PTX.html

0.1 KB

21.4 Harmj0y Blog.html

0.1 KB

21.5 Active Directory Security Blog.html

0.1 KB

/.../19. Post Exploitation/

1. Introduction.mp4

2.9 MB

2. File Transfers Review.mp4

8.4 MB

3. Maintaining Access Overview.mp4

8.2 MB

4. Pivoting Lab Setup.mp4

62.0 MB

5. Pivoting Walkthrough.mp4

54.6 MB

6. Cleaning Up.mp4

5.9 MB

/.../20. Web Application Enumeration, Revisited/

1. Introduction.mp4

3.7 MB

2. Installing Go.mp4

51.3 MB

3. Finding Subdomains with Assetfinder.mp4

38.1 MB

4. Finding Subdomains with Amass.mp4

59.7 MB

5. Finding Alive Domains with Httprobe.mp4

79.3 MB

6. Screenshotting Websites with GoWitness.mp4

35.3 MB

7. Automating the Enumeration Process.mp4

56.4 MB

/.../21. Testing the Top 10 Web Application Vulnerabilities/

1. Introduction.mp4

4.1 MB

2. The OWASP Top 10 and OWASP Testing Checklist.mp4

136.7 MB

2.1 OWASP Top 10.html

0.1 KB

2.2 OWASP Testing Checklist.html

0.1 KB

2.3 OWASP Testing Guide.html

0.1 KB

3. Installing OWASP Juice Shop.mp4

92.9 MB

3.1 OWASP Juice Shop.html

0.1 KB

3.2 Installing Docker on Kali.html

0.1 KB

4. Installing Foxy Proxy.mp4

28.4 MB

5. Exploring Burp Suite.mp4

111.2 MB

6. Introducing the Score Board.mp4

32.2 MB

7. SQL Injection Attacks Overview.mp4

20.2 MB

7.1 Top 10-2017 A1-Injection.html

0.1 KB

8. SQL Injection Walkthrough.mp4

89.3 MB

9. SQL Injection Defenses.mp4

9.7 MB

10. Broken Authentication Overview and Defenses.mp4

82.4 MB

10.1 Top 10-2017 A2-Broken Authentication.html

0.1 KB

11. Testing for Broken Authentication.mp4

66.6 MB

12. Sensitive Data Exposure Overview and Defenses.mp4

69.9 MB

12.1 Top 10-2017 A3-Sensitive Data Exposure.html

0.1 KB

13. Testing for Sensitive Data Exposure.mp4

83.8 MB

14. XML External Entities (XXE) Overview.mp4

29.5 MB

14.1 Top 10-2017 A4-XML External Entities (XXE).html

0.1 KB

15. XXE Attack and Defense.mp4

81.2 MB

16. Broken Access Control Overview.mp4

50.9 MB

16.1 Top 10-2017 A5-Broken Access Control.html

0.1 KB

17. Broken Access Control Walkthrough.mp4

37.2 MB

18. Security Misconfiguration Attacks and Defenses.mp4

71.5 MB

18.1 Top 10-2017 A6-Security Misconfiguration.html

0.1 KB

19. Cross-Site Scripting (XSS) Overview.mp4

85.8 MB

19.1 XSS Game.html

0.1 KB

19.2 Top 10-2017 A7-Cross-Site Scripting (XSS).html

0.1 KB

19.3 DOM BASED CROSS SITE SCRIPTING.html

0.1 KB

20. Reflected XSS Walkthrough.mp4

77.2 MB

21. Stored XSS Walkthrough.mp4

51.4 MB

22. Preventing XSS.mp4

12.4 MB

23. Insecure Deserialization.mp4

60.1 MB

23.1 Top 10-2017 A8-Insecure Deserialization.html

0.1 KB

24. Using Components with Known Vulnerabilities.mp4

55.5 MB

24.1 Top 10-2017 A9-Using Components with Known Vulnerabilities.html

0.2 KB

25. Insufficient Logging and Monitoring.mp4

42.5 MB

25.1 Top 10-2017 A10-Insufficient Logging&Monitoring.html

0.1 KB

/.../22. Wireless Penetration Testing/

1. Wireless Penetration Testing Overview.mp4

50.7 MB

2. WPA PSK Exploit Walkthrough.mp4

133.1 MB

/.../23. Legal Documents and Report Writing/

1. Common Legal Documents.mp4

26.7 MB

2. Pentest Report Writing.mp4

65.6 MB

2.1 Sample Pentest Report Github.html

0.1 KB

2.2 Demo Company - Security Assessment Findings Report.pdf.pdf

326.7 KB

3. Reviewing a Real Pentest Report.mp4

83.1 MB

/.../24. Career Advice/

1. Career Advice.mp4

38.3 MB

/.../25. BONUS Section/

1. BONUS LECTURE Course Discord Channel and Other Author Resources.mp4

44.6 MB

1.1 Course Discord.html

0.1 KB

1.2 The Cyber Mentor.html

0.1 KB

/.../1. Introduction to Ethical Hacking/

1. What is an ethical hacker.mp4

23.8 MB

1. What is an ethical hacker.srt

7.3 KB

1.1 Section 1 - Introduction to Ethical Hacking.pptx.pptx

39.0 KB

2. Terminology crash course pt. 1.mp4

43.7 MB

2. Terminology crash course pt. 1.srt

10.2 KB

3. Terminology crash course pt. 2.mp4

62.5 MB

3. Terminology crash course pt. 2.srt

15.8 KB

4. Terminology crash course pt. 3.mp4

39.1 MB

4. Terminology crash course pt. 3.srt

9.2 KB

5. Confidentiality, integrity, and availability.mp4

47.5 MB

5. Confidentiality, integrity, and availability.srt

14.7 KB

6. Legal considerations.mp4

40.7 MB

6. Legal considerations.srt

12.5 KB

/.../2. Reconnaissance - Surveying the Attack Surface/

1. Surveying the attack surface.mp4

37.3 MB

1. Surveying the attack surface.srt

12.4 KB

1.1 Section 2 - Reconnaissance.pptx.pptx

43.3 KB

2. Recon types and goals.mp4

38.3 MB

2. Recon types and goals.srt

9.3 KB

3. Passive recon pt. 1.mp4

38.4 MB

3. Passive recon pt. 1.srt

7.6 KB

4. Passive recon pt. 2.mp4

52.5 MB

4. Passive recon pt. 2.srt

11.9 KB

5. Active recon.mp4

68.3 MB

5. Active recon.srt

16.1 KB

6. Recon walk-through and tools summary.mp4

91.9 MB

6. Recon walk-through and tools summary.srt

16.3 KB

7. DEMO - Maltego real world example.mp4

93.8 MB

7. DEMO - Maltego real world example.srt

6.7 KB

8. DEMO - FOCA to examine metadata.mp4

55.7 MB

8. DEMO - FOCA to examine metadata.srt

4.5 KB

9. DEMO - Harvester.mp4

17.8 MB

9. DEMO - Harvester.srt

2.2 KB

10. DEMO - Information collection using Recon-ng.mp4

77.1 MB

10. DEMO - Information collection using Recon-ng.srt

5.5 KB

/.../3. Scanning and Enumeration - Getting Down to Business/

1. Scanning & enumeration.mp4

33.3 MB

1. Scanning & enumeration.srt

8.8 KB

1.1 Section 3 - Scanning and Enumeration.pptx.pptx

43.8 KB

2. Identifying active hosts pt. 1.mp4

43.3 MB

2. Identifying active hosts pt. 1.srt

10.7 KB

3. Identifying active hosts pt. 2.mp4

59.0 MB

3. Identifying active hosts pt. 2.srt

14.7 KB

4. Identifying active services.mp4

75.3 MB

4. Identifying active services.srt

20.6 KB

5. OS and services fingerprinting.mp4

59.6 MB

5. OS and services fingerprinting.srt

15.8 KB

6. Network mapping.mp4

39.5 MB

6. Network mapping.srt

10.9 KB

7. Final thoughts.mp4

53.4 MB

7. Final thoughts.srt

12.1 KB

8. DEMO - Nmap syntax pt. 1.mp4

150.5 MB

8. DEMO - Nmap syntax pt. 1.srt

15.9 KB

9. DEMO - Nmap syntax pt. 2.mp4

201.7 MB

9. DEMO - Nmap syntax pt. 2.srt

18.0 KB

10. DEMO - Nmap hosts discovery.mp4

112.1 MB

10. DEMO - Nmap hosts discovery.srt

10.7 KB

11. DEMO - Nmap service discovery.mp4

174.7 MB

11. DEMO - Nmap service discovery.srt

15.1 KB

12. DEMO - Nmap scripts.mp4

147.1 MB

12. DEMO - Nmap scripts.srt

11.1 KB

13. DEMO - masscan.mp4

116.9 MB

13. DEMO - masscan.srt

10.3 KB

/4. Network Presence/

1. Network insecurity.mp4

29.5 MB

1. Network insecurity.srt

4.0 KB

1.1 Section 4 - Network Presence.pptx.pptx

12.7 MB

2. Sniffing and spoofing.mp4

75.7 MB

2. Sniffing and spoofing.srt

75.7 MB

3. Sniffing tools.mp4

46.4 MB

3. Sniffing tools.srt

9.8 KB

4. Spoofing, crypto, and wifi.mp4

66.0 MB

4. Spoofing, crypto, and wifi.srt

16.8 KB

5. DEMO - tcpdump.mp4

137.6 MB

5. DEMO - tcpdump.srt

9.6 KB

6. DEMO - Wireshark.mp4

117.9 MB

6. DEMO - Wireshark.srt

10.7 KB

7. DEMO - Ettercap.mp4

160.0 MB

7. DEMO - Ettercap.srt

12.2 KB

8. DEMO - Burp Suite.mp4

128.6 MB

8. DEMO - Burp Suite.srt

16.5 KB

9. DEMO - Scapy.mp4

69.3 MB

9. DEMO - Scapy.srt

9.7 KB

/5. Attacking/

1. Security overview pt. 1 Windows architecture.mp4

96.3 MB

1. Security overview pt. 1 Windows architecture.srt

18.5 KB

1.1 Section 5 - Attacking.pptx.pptx

41.2 KB

2. Security overview pt. 2 credentials security.mp4

91.4 MB

2. Security overview pt. 2 credentials security.srt

15.1 KB

3. Security overview pt. 3 memory corruption & exploitation.mp4

91.2 MB

3. Security overview pt. 3 memory corruption & exploitation.srt

16.6 KB

4. Windows hacking basics.mp4

114.3 MB

4. Windows hacking basics.srt

22.4 KB

5. Local access and privilege escalation.mp4

115.9 MB

5. Local access and privilege escalation.srt

20.4 KB

6. Dumping hashes and cracking passwords.mp4

110.1 MB

6. Dumping hashes and cracking passwords.srt

18.8 KB

7. Linux attacking basics pt. 1.mp4

62.7 MB

7. Linux attacking basics pt. 1.srt

12.8 KB

8. Linux attacking basics pt. 2.mp4

68.0 MB

8. Linux attacking basics pt. 2.srt

14.1 KB

9. References.mp4

39.9 MB

9. References.srt

5.7 KB

10. DEMO - Windows msf exploit pt. 1.mp4

148.1 MB

10. DEMO - Windows msf exploit pt. 1.srt

12.5 KB

11. DEMO - Windows msf exploit pt. 2.mp4

208.6 MB

11. DEMO - Windows msf exploit pt. 2.srt

14.4 KB

12. DEMO - Post exploitation activities.mp4

139.4 MB

12. DEMO - Post exploitation activities.srt

12.2 KB

13. DEMO - Mimikatz.mp4

50.0 MB

13. DEMO - Mimikatz.srt

8.0 KB

14. DEMO - Dumping hashes.mp4

28.6 MB

14. DEMO - Dumping hashes.srt

3.3 KB

15. DEMO - Hashcat.mp4

98.7 MB

15. DEMO - Hashcat.srt

7.6 KB

16. DEMO - Konboot.mp4

145.2 MB

16. DEMO - Konboot.srt

12.3 KB

17. DEMO - Post exploitation Windows cmd.mp4

130.6 MB

17. DEMO - Post exploitation Windows cmd.srt

14.7 KB

18. DEMO - Post exploitation Windows powershell.mp4

180.5 MB

18. DEMO - Post exploitation Windows powershell.srt

12.8 KB

19. DEMO - Online password cracking pt. 1.mp4

180.1 MB

19. DEMO - Online password cracking pt. 1.srt

15.1 KB

20. DEMO - Online password cracking pt. 2.mp4

159.4 MB

20. DEMO - Online password cracking pt. 2.srt

10.3 KB

21. DEMO - Attacking Linux targets pt. 1.mp4

118.2 MB

21. DEMO - Attacking Linux targets pt. 1.srt

7.5 KB

22. DEMO - Attacking Linux targets pt. 2.mp4

165.6 MB

22. DEMO - Attacking Linux targets pt. 2.srt

12.5 KB

/6. Web Hacking/

1. Introduction to web hacking.mp4

4.9 MB

1. Introduction to web hacking.srt

2.8 KB

1.1 Section 6 - Web Hacking.pptx.pptx

120.1 KB

2. Web security architecture overview pt. 1.mp4

102.1 MB

2. Web security architecture overview pt. 1.srt

17.2 KB

3. Web security architecture overview pt. 2.mp4

75.5 MB

3. Web security architecture overview pt. 2.srt

13.5 KB

4. Attacking the web server pt. 1.mp4

68.9 MB

4. Attacking the web server pt. 1.srt

11.3 KB

5. Attacking the webserver pt. 2.mp4

72.2 MB

5. Attacking the webserver pt. 2.srt

12.9 KB

6. Attacking the platform pt. 1.mp4

100.4 MB

6. Attacking the platform pt. 1.srt

19.8 KB

7. Attacking the platform pt. 2.mp4

44.5 MB

7. Attacking the platform pt. 2.srt

8.7 KB

8. Attacking the technology pt. 1.mp4

113.8 MB

8. Attacking the technology pt. 1.srt

22.3 KB

9. Attacking the technology pt. 2.mp4

93.9 MB

9. Attacking the technology pt. 2.srt

18.3 KB

10. OWASP top 10 pt. 1.mp4

49.8 MB

10. OWASP top 10 pt. 1.srt

9.7 KB

11. OWASP top 10 pt. 2.mp4

116.1 MB

11. OWASP top 10 pt. 2.srt

23.0 KB

12. Attacking the business logic pt. 1.mp4

51.4 MB

12. Attacking the business logic pt. 1.srt

11.1 KB

13. Attacking the business logic pt. 2.mp4

73.2 MB

13. Attacking the business logic pt. 2.srt

15.8 KB

14. Tools and methodology.mp4

102.4 MB

14. Tools and methodology.srt

21.4 KB

15. References.mp4

58.4 MB

15. References.srt

8.1 KB

16. DEMO - OWASP Mutillidae.mp4

78.7 MB

16. DEMO - OWASP Mutillidae.srt

9.6 KB

17. DEMO - SQL injection.mp4

62.5 MB

17. DEMO - SQL injection.srt

7.6 KB

18. DEMO - SQLMAP intro.mp4

84.6 MB

18. DEMO - SQLMAP intro.srt

9.2 KB

19. DEMO - SQLMAP practice.mp4

339.4 MB

19. DEMO - SQLMAP practice.srt

24.3 KB

20. DEMO - Burpsuite.mp4

336.3 MB

20. DEMO - Burpsuite.srt

40.9 KB

21. DEMO - Burpsuite XSS Hunter.mp4

183.7 MB

21. DEMO - Burpsuite XSS Hunter.srt

15.5 KB

22. DEMO - mitmproxy.mp4

129.8 MB

22. DEMO - mitmproxy.srt

9.5 KB

23. DEMO - Skipfish pt.1.mp4

26.3 MB

23. DEMO - Skipfish pt.1.srt

3.0 KB

24. DEMO - Skipfish pt.2.mp4

54.7 MB

24. DEMO - Skipfish pt.2.srt

3.9 KB

/.../7. Social Engineering - Hacking Humans/

1. Social engineering basics.mp4

57.5 MB

1. Social engineering basics.srt

16.1 KB

1.1 Section 7 - Social Engineering.pptx.pptx

40.8 KB

2. Social engineering methods.mp4

58.6 MB

2. Social engineering methods.srt

16.9 KB

3. Tools and techniques pt. 1.mp4

61.9 MB

3. Tools and techniques pt. 1.srt

15.1 KB

4. Tools and techniques pt. 2.mp4

49.9 MB

4. Tools and techniques pt. 2.srt

12.4 KB

5. Tools and techniques pt. 3.mp4

38.7 MB

5. Tools and techniques pt. 3.srt

9.0 KB

6. Physical security considerations.mp4

46.5 MB

6. Physical security considerations.srt

13.5 KB

7. Final thoughts.mp4

30.7 MB

7. Final thoughts.srt

5.5 KB

8. DEMO - Social engineering intro.mp4

68.8 MB

8. DEMO - Social engineering intro.srt

10.7 KB

9. DEMO - Social engineering toolkit prep.mp4

79.1 MB

9. DEMO - Social engineering toolkit prep.srt

9.7 KB

10. DEMO - Credential harvesting.mp4

19.4 MB

10. DEMO - Credential harvesting.srt

2.3 KB

11. DEMO - Website cloning.mp4

75.2 MB

11. DEMO - Website cloning.srt

6.0 KB

12. DEMO - Automating an attack.mp4

36.2 MB

12. DEMO - Automating an attack.srt

2.7 KB

13. DEMO - Anti-virus evasion pt. 1.mp4

121.0 MB

13. DEMO - Anti-virus evasion pt. 1.srt

7.9 KB

14. DEMO - Anti-virus evasion pt. 2.mp4

150.4 MB

14. DEMO - Anti-virus evasion pt. 2.srt

8.1 KB

/.../1. Introduction and Setup/

1. Welcome to Python for ethical hacking!.mp4

13.5 MB

1. Welcome to Python for ethical hacking!.srt

7.5 KB

2. VirtualBox installation.mp4

80.1 MB

2. VirtualBox installation.srt

16.8 KB

3. Kali Linux installation.mp4

70.7 MB

3. Kali Linux installation.srt

24.8 KB

4. Adding Guest Additions.mp4

105.8 MB

4. Adding Guest Additions.srt

21.3 KB

5. Python in Kali terminal.mp4

54.0 MB

5. Python in Kali terminal.srt

19.1 KB

/.../2. Port and Vulnerability Scanning/

1. Coding a simple port scanner.mp4

67.2 MB

1. Coding a simple port scanner.srt

20.4 KB

2. Adding raw_input to our port scanner.mp4

46.0 MB

2. Adding raw_input to our port scanner.srt

12.1 KB

3. Scanning the first 1,000 ports.mp4

30.0 MB

3. Scanning the first 1,000 ports.srt

6.3 KB

4. Coding an advanced port scanner part 1.mp4

65.2 MB

4. Coding an advanced port scanner part 1.srt

17.4 KB

5. Coding an advanced port scanner part 2.mp4

65.1 MB

5. Coding an advanced port scanner part 2.srt

11.3 KB

6. Finishing and testing our scanner.mp4

60.4 MB

6. Finishing and testing our scanner.srt

11.1 KB

7. Configuring IP address and installing Metasploitable.mp4

59.8 MB

7. Configuring IP address and installing Metasploitable.srt

11.2 KB

8. Returning banner from open port.mp4

80.3 MB

8. Returning banner from open port.srt

18.2 KB

9. Coding a vulnerability scanner part 1.mp4

58.0 MB

9. Coding a vulnerability scanner part 1.srt

14.7 KB

10. Coding a vulnerability scanner part 2.mp4

42.8 MB

10. Coding a vulnerability scanner part 2.srt

9.5 KB

/.../3. SSH and FTP Attacks/

1. Automating SSH login part 1.mp4

48.2 MB

1. Automating SSH login part 1.srt

13.0 KB

2. Automating SSH login part 2.mp4

56.8 MB

2. Automating SSH login part 2.srt

11.6 KB

3. Testing our SSH login program.mp4

56.8 MB

3. Testing our SSH login program.srt

11.1 KB

4. Coding a SSH brute-forcer.mp4

65.9 MB

4. Coding a SSH brute-forcer.srt

14.0 KB

5. Executing commands on target after brute-forcing SSH.mp4

63.6 MB

5. Executing commands on target after brute-forcing SSH.srt

13.7 KB

6. Anonymous FTP login attack.mp4

47.3 MB

6. Anonymous FTP login attack.srt

12.3 KB

7. Username & password list attack on FTP.mp4

96.2 MB

7. Username & password list attack on FTP.srt

21.1 KB

/4. Password Cracking/

1. SHA256, SHA512, MD5.mp4

44.1 MB

1. SHA256, SHA512, MD5.srt

11.4 KB

2. Cracking SHA1 hash with online dictionary.mp4

89.2 MB

2. Cracking SHA1 hash with online dictionary.srt

21.4 KB

3. Getting password from MD5 hash.mp4

62.9 MB

3. Getting password from MD5 hash.srt

17.1 KB

4. Cracking crypt passwords with salt.mp4

126.8 MB

4. Cracking crypt passwords with salt.srt

28.7 KB

/.../5. Sniffers, Flooders and Spoofers/

1. Changing MAC address manually.mp4

53.4 MB

1. Changing MAC address manually.srt

11.5 KB

2. Coding MAC address changer.mp4

97.4 MB

2. Coding MAC address changer.srt

20.1 KB

3. Theory behind ARP spoofing.mp4

35.0 MB

3. Theory behind ARP spoofing.srt

6.6 KB

4. Crafting malicious ARP packet.mp4

151.2 MB

4. Crafting malicious ARP packet.srt

25.0 KB

5. Coding ARP spoofer.mp4

65.7 MB

5. Coding ARP spoofer.srt

17.0 KB

6. Forwarding packets and restoring ARP tables.mp4

43.9 MB

6. Forwarding packets and restoring ARP tables.srt

9.8 KB

7. Spoofing our IP address and sending message with TCP payload.mp4

74.1 MB

7. Spoofing our IP address and sending message with TCP payload.srt

15.5 KB

8. Running SynFlooder with changed source IP address.mp4

68.9 MB

8. Running SynFlooder with changed source IP address.srt

13.5 KB

9. Getting source and destination MAC address from received packets.mp4

136.7 MB

9. Getting source and destination MAC address from received packets.srt

32.9 KB

10. Sniffing FTP username and password part 1.mp4

38.8 MB

10. Sniffing FTP username and password part 1.srt

10.3 KB

11. Sniffing FTP username and password part 2.mp4

84.0 MB

11. Sniffing FTP username and password part 2.srt

15.4 KB

12. Getting passwords from HTTP websites.mp4

81.5 MB

12. Getting passwords from HTTP websites.srt

17.3 KB

/.../6. Coding DNS Spoofer/

1. Cloning any webpage.mp4

63.6 MB

1. Cloning any webpage.srt

13.9 KB

2. Printing DNS queries.mp4

58.3 MB

2. Printing DNS queries.srt

13.2 KB

3. Redirecting response to cloned page.mp4

217.3 MB

3. Redirecting response to cloned page.srt

20.9 KB

4. Setting IP table rules and running DNS spoofer.mp4

137.3 MB

4. Setting IP table rules and running DNS spoofer.srt

13.6 KB

/7. Network Analysis/

1. Analyzing Ethernet header.mp4

82.8 MB

1. Analyzing Ethernet header.srt

22.3 KB

2. Analyzing IP header part 1.mp4

76.0 MB

2. Analyzing IP header part 1.srt

13.1 KB

3. Analyzing IP header part 2.mp4

229.5 MB

3. Analyzing IP header part 2.srt

33.1 KB

4. Analyzing TCP header.mp4

128.7 MB

4. Analyzing TCP header.srt

18.5 KB

5. Analyzing UDP header.mp4

104.6 MB

5. Analyzing UDP header.srt

15.2 KB

/.../8. Multi-functioning Reverse Shell/

1. Theory behind socket programming.mp4

28.9 MB

1. Theory behind socket programming.srt

10.6 KB

2. Wine and Pyinstaller installation.mp4

42.5 MB

2. Wine and Pyinstaller installation.srt

10.7 KB

3. Setting up listener.mp4

35.7 MB

3. Setting up listener.srt

11.0 KB

4. Establishing connection between target and server.mp4

33.8 MB

4. Establishing connection between target and server.srt

9.1 KB

5. Implementing send & receive functions.mp4

69.1 MB

5. Implementing send & receive functions.srt

14.4 KB

6. Executing commands on target system.mp4

72.4 MB

6. Executing commands on target system.srt

14.7 KB

7. Importing JSON library to parse data.mp4

55.9 MB

7. Importing JSON library to parse data.srt

11.0 KB

8. Converting Python backdoor to .exe.mp4

56.7 MB

8. Converting Python backdoor to .exe.srt

10.9 KB

9. Using OS library to change directory.mp4

61.0 MB

9. Using OS library to change directory.srt

13.1 KB

10. Downloading & uploading files to target PC.mp4

121.4 MB

10. Downloading & uploading files to target PC.srt

24.5 KB

11. Hiding our backdoor and creating persistence.mp4

82.1 MB

11. Hiding our backdoor and creating persistence.srt

18.6 KB

12. Trying to connect to server every 20 seconds.mp4

39.9 MB

12. Trying to connect to server every 20 seconds.srt

10.6 KB

13. Downloading files to target PC.mp4

71.2 MB

13. Downloading files to target PC.srt

15.1 KB

14. Capturing screenshot on target PC.mp4

147.1 MB

14. Capturing screenshot on target PC.srt

31.6 KB

15. Administrator privilege check.mp4

47.1 MB

15. Administrator privilege check.srt

10.2 KB

16. Starting other programs with our shell.mp4

76.3 MB

16. Starting other programs with our shell.srt

13.4 KB

17. Running our shell as an image, audio, PDF.mp4

143.3 MB

17. Running our shell as an image, audio, PDF.srt

26.0 KB

/9. Coding a Keylogger/

1. Installing Pynput.mp4

25.0 MB

1. Installing Pynput.srt

8.6 KB

2. Printing space character.mp4

38.7 MB

2. Printing space character.srt

11.4 KB

3. Calling timer on our keylogger.mp4

52.7 MB

3. Calling timer on our keylogger.srt

12.7 KB

4. Adding keylogger to our backdoor.mp4

96.1 MB

4. Adding keylogger to our backdoor.srt

16.3 KB

/.../10. Command and Control Center/

1. What is a threaded server.mp4

25.5 MB

1. What is a threaded server.srt

7.0 KB

2. Accepting connections with a thread.mp4

63.6 MB

2. Accepting connections with a thread.srt

17.3 KB

3. Managing multiple sessions.mp4

47.9 MB

3. Managing multiple sessions.srt

11.1 KB

4. Testing threaded server with Windows 10 target.mp4

64.8 MB

4. Testing threaded server with Windows 10 target.srt

11.8 KB

5. Fixing Q command.mp4

90.3 MB

5. Fixing Q command.srt

14.4 KB

6. Coding exit function.mp4

88.0 MB

6. Coding exit function.srt

17.6 KB

7. Attacking multiple targets and gathering botnet.mp4

110.7 MB

7. Attacking multiple targets and gathering botnet.srt

19.9 KB

/.../11. Website Penetration Testing/

1. Stealing saved wireless passwords.mp4

111.9 MB

1. Stealing saved wireless passwords.srt

27.5 KB

2. Saving passwords to a file.mp4

16.5 MB

2. Saving passwords to a file.srt

4.3 KB

3. Bruteforcing Gmail.mp4

43.1 MB

3. Bruteforcing Gmail.srt

11.8 KB

4. Bruteforcing any login page part 1.mp4

93.7 MB

4. Bruteforcing any login page part 1.srt

17.5 KB

5. Bruteforcing any login page part 2.mp4

68.8 MB

5. Bruteforcing any login page part 2.srt

13.4 KB

6. Finding hidden directories part 1.mp4

22.5 MB

6. Finding hidden directories part 1.srt

6.5 KB

7. Finding hidden directories part 2.mp4

47.5 MB

7. Finding hidden directories part 2.srt

8.9 KB

8. Discovering subdomains.mp4

62.5 MB

8. Discovering subdomains.srt

14.9 KB

9. Changing HTTP headers.mp4

79.4 MB

9. Changing HTTP headers.srt

17.6 KB

10. Starting basic and digest authentication bruteforcer.mp4

48.7 MB

10. Starting basic and digest authentication bruteforcer.srt

13.5 KB

11. Controlling threads.mp4

48.2 MB

11. Controlling threads.srt

11.2 KB

12. Coding run function.mp4

63.1 MB

12. Coding run function.srt

12.9 KB

13. Printing usage and testing our program.mp4

83.0 MB

13. Printing usage and testing our program.srt

14.4 KB

14. Taking a look at ransomware.mp4

78.2 MB

14. Taking a look at ransomware.srt

11.8 KB

 

Total files 2870


Copyright © 2025 FileMood.com