本站已收录 番号和无损神作磁力链接/BT种子 

PEN-200

种子简介

种子名称: PEN-200
文件类型: 视频
文件数目: 135个文件
文件大小: 2.96 GB
收录时间: 2025-8-27 04:17
已经下载: 3
资源热度: 5
最近下载: 2025-8-30 22:34

下载BT种子文件

下载Torrent文件(.torrent) 立即下载

磁力链接下载

magnet:?xt=urn:btih:8a232f203cc140b3b04b7f7b67427ed00533acb5&dn=PEN-200 复制链接到迅雷、QQ旋风进行下载,或者使用百度云离线下载。

喜欢这个种子的人也喜欢

种子包含的文件

PEN-200.torrent
  • PEN-200 - Penetration Testing with Kali Linux Videos/12. LINUX PRIVILEGE ESCALATION/12.1. Enumerating Linux/12.1.1. Manual Enumeration.mp478.9MB
  • PEN-200 - Penetration Testing with Kali Linux Videos/01. INFORMATION GATHERING/1.1. Passive Information Gathering/1.1.1. Whois Enumeration.mp47.85MB
  • PEN-200 - Penetration Testing with Kali Linux Videos/01. INFORMATION GATHERING/1.1. Passive Information Gathering/1.1.2. Google Hacking.mp413.13MB
  • PEN-200 - Penetration Testing with Kali Linux Videos/01. INFORMATION GATHERING/1.1. Passive Information Gathering/1.1.3. Netcraft.mp46.11MB
  • PEN-200 - Penetration Testing with Kali Linux Videos/01. INFORMATION GATHERING/1.1. Passive Information Gathering/1.1.4. Open-Source Code.mp45.22MB
  • PEN-200 - Penetration Testing with Kali Linux Videos/01. INFORMATION GATHERING/1.1. Passive Information Gathering/1.1.5. Shodan.mp49.78MB
  • PEN-200 - Penetration Testing with Kali Linux Videos/01. INFORMATION GATHERING/1.1. Passive Information Gathering/1.1.6. Security Headers and SSL_TLS.mp47.37MB
  • PEN-200 - Penetration Testing with Kali Linux Videos/01. INFORMATION GATHERING/1.2. Active Information Gathering/1.2.1. DNS Enumeration.mp431.35MB
  • PEN-200 - Penetration Testing with Kali Linux Videos/01. INFORMATION GATHERING/1.2. Active Information Gathering/1.2.2. Port Scanning with Nmap.mp441.53MB
  • PEN-200 - Penetration Testing with Kali Linux Videos/01. INFORMATION GATHERING/1.2. Active Information Gathering/1.2.3. SMB Enumeration.mp412.9MB
  • PEN-200 - Penetration Testing with Kali Linux Videos/01. INFORMATION GATHERING/1.2. Active Information Gathering/1.2.4. SMTP Enumeration.mp48.09MB
  • PEN-200 - Penetration Testing with Kali Linux Videos/01. INFORMATION GATHERING/1.2. Active Information Gathering/1.2.5. SNMP Enumeration.mp419.39MB
  • PEN-200 - Penetration Testing with Kali Linux Videos/02. VULNERABILITY SCANNING/2.1. Vulnerability Scanning with Nessus/2.1.1. Nessus Components.mp417.22MB
  • PEN-200 - Penetration Testing with Kali Linux Videos/02. VULNERABILITY SCANNING/2.1. Vulnerability Scanning with Nessus/2.1.2. Performing a Vulnerability Scan.mp416.4MB
  • PEN-200 - Penetration Testing with Kali Linux Videos/02. VULNERABILITY SCANNING/2.1. Vulnerability Scanning with Nessus/2.1.3. Analyzing the Results.mp422.32MB
  • PEN-200 - Penetration Testing with Kali Linux Videos/02. VULNERABILITY SCANNING/2.1. Vulnerability Scanning with Nessus/2.1.4. Performing an Authenticated Vulnerability Scan.mp420.43MB
  • PEN-200 - Penetration Testing with Kali Linux Videos/02. VULNERABILITY SCANNING/2.1. Vulnerability Scanning with Nessus/2.1.5. Working with Nessus Plugins.mp422.36MB
  • PEN-200 - Penetration Testing with Kali Linux Videos/02. VULNERABILITY SCANNING/2.2. Vulnerability Scanning with Nmap/2.2.1. NSE Vulnerability Scripts.mp420MB
  • PEN-200 - Penetration Testing with Kali Linux Videos/02. VULNERABILITY SCANNING/2.2. Vulnerability Scanning with Nmap/2.2.2. Working with NSE Scripts.mp412.16MB
  • PEN-200 - Penetration Testing with Kali Linux Videos/03. INTRODUCTION TO WEB APPLICATION ATTACKS/3.1. Web Application Assessment Tools/3.1.1. Fingerprinting Web Servers with Nmap.mp43.49MB
  • PEN-200 - Penetration Testing with Kali Linux Videos/03. INTRODUCTION TO WEB APPLICATION ATTACKS/3.1. Web Application Assessment Tools/3.1.2. Directory Brute Force with Gobuster.mp43.97MB
  • PEN-200 - Penetration Testing with Kali Linux Videos/03. INTRODUCTION TO WEB APPLICATION ATTACKS/3.1. Web Application Assessment Tools/3.1.3. Security Testing with Burp Suite.mp434.78MB
  • PEN-200 - Penetration Testing with Kali Linux Videos/03. INTRODUCTION TO WEB APPLICATION ATTACKS/3.2. Web Application Enumeration/3.2.1. Debugging Page Content.mp413.1MB
  • PEN-200 - Penetration Testing with Kali Linux Videos/03. INTRODUCTION TO WEB APPLICATION ATTACKS/3.2. Web Application Enumeration/3.2.2. Inspecting HTTP Response Headers and Sitemaps.mp412.17MB
  • PEN-200 - Penetration Testing with Kali Linux Videos/03. INTRODUCTION TO WEB APPLICATION ATTACKS/3.2. Web Application Enumeration/3.2.3. Enumerating and Abusing APIs.mp428.28MB
  • PEN-200 - Penetration Testing with Kali Linux Videos/03. INTRODUCTION TO WEB APPLICATION ATTACKS/3.3. Cross-Site Scripting/3.3.1. Basic XSS.mp415.07MB
  • PEN-200 - Penetration Testing with Kali Linux Videos/03. INTRODUCTION TO WEB APPLICATION ATTACKS/3.3. Cross-Site Scripting/3.3.2. Privilege Escalation via XSS.mp434.18MB
  • PEN-200 - Penetration Testing with Kali Linux Videos/04. COMMON WEB APPLICATION ATTACKS/4.1. Directory Traversal/4.1.1. Absolute vs Relative Paths.mp414.15MB
  • PEN-200 - Penetration Testing with Kali Linux Videos/04. COMMON WEB APPLICATION ATTACKS/4.1. Directory Traversal/4.1.2. Identifying and Exploiting Directory Traversals.mp438.35MB
  • PEN-200 - Penetration Testing with Kali Linux Videos/04. COMMON WEB APPLICATION ATTACKS/4.1. Directory Traversal/4.1.3. Encoding Special Characters.mp45.93MB
  • PEN-200 - Penetration Testing with Kali Linux Videos/04. COMMON WEB APPLICATION ATTACKS/4.2. File Inclusion Vulnerabilities/4.2.1. Local File Inclusion (LFI).mp445.04MB
  • PEN-200 - Penetration Testing with Kali Linux Videos/04. COMMON WEB APPLICATION ATTACKS/4.2. File Inclusion Vulnerabilities/4.2.2. PHP Wrappers.mp416.3MB
  • PEN-200 - Penetration Testing with Kali Linux Videos/04. COMMON WEB APPLICATION ATTACKS/4.2. File Inclusion Vulnerabilities/4.2.3. Remote File Inclusion (RFI).mp47.13MB
  • PEN-200 - Penetration Testing with Kali Linux Videos/04. COMMON WEB APPLICATION ATTACKS/4.3. File Upload Vulnerabilities/4.3.1. Using Executable Files.mp429.91MB
  • PEN-200 - Penetration Testing with Kali Linux Videos/04. COMMON WEB APPLICATION ATTACKS/4.3. File Upload Vulnerabilities/4.3.2. Using Non-Executable Files.mp429.91MB
  • PEN-200 - Penetration Testing with Kali Linux Videos/04. COMMON WEB APPLICATION ATTACKS/4.4. Command Injection/4.4.1. OS Command Injection.mp423.56MB
  • PEN-200 - Penetration Testing with Kali Linux Videos/05. SQL INJECTION ATTACKS/5.1. SQL Theory and Databases/5.1.1. DB Types and Characteristics.mp412.43MB
  • PEN-200 - Penetration Testing with Kali Linux Videos/05. SQL INJECTION ATTACKS/5.2. Manual SQL Exploitation/5.2.1. Identifying SQLi via Error-based Paylaods.mp412.47MB
  • PEN-200 - Penetration Testing with Kali Linux Videos/05. SQL INJECTION ATTACKS/5.2. Manual SQL Exploitation/5.2.2. UNION-based Payloads.mp414.43MB
  • PEN-200 - Penetration Testing with Kali Linux Videos/05. SQL INJECTION ATTACKS/5.2. Manual SQL Exploitation/5.2.3. Blind SQL Injections.mp47.24MB
  • PEN-200 - Penetration Testing with Kali Linux Videos/05. SQL INJECTION ATTACKS/5.3. Manual and Automated Code Execution/5.3.1. Manual Code Execution.mp411.44MB
  • PEN-200 - Penetration Testing with Kali Linux Videos/05. SQL INJECTION ATTACKS/5.3. Manual and Automated Code Execution/5.3.2. Automating the Attack.mp424.61MB
  • PEN-200 - Penetration Testing with Kali Linux Videos/06. CLIENT-SIDE ATTACKS/6.1. Target Reconnaissance/6.1.1. Information Gathering.mp411.97MB
  • PEN-200 - Penetration Testing with Kali Linux Videos/06. CLIENT-SIDE ATTACKS/6.1. Target Reconnaissance/6.1.2. Client Fingerprinting.mp416.94MB
  • PEN-200 - Penetration Testing with Kali Linux Videos/06. CLIENT-SIDE ATTACKS/6.2. Exploiting Microsoft Office/6.2.1. Leveraging Microsoft Word Macros.mp438.81MB
  • PEN-200 - Penetration Testing with Kali Linux Videos/06. CLIENT-SIDE ATTACKS/6.3. Abusing Windows Library Files/6.3.1. Obtaining Code Execution via Windows Library Files.mp445.39MB
  • PEN-200 - Penetration Testing with Kali Linux Videos/07. ANTIVIRUS EVASION/7.1. Antivirus Software Key Components and Operations/7.1.1. Detection Methods.mp419.02MB
  • PEN-200 - Penetration Testing with Kali Linux Videos/07. ANTIVIRUS EVASION/7.2. AV Evasion in Practice/7.2.1. Evading AV with Thread Injection.mp456.45MB
  • PEN-200 - Penetration Testing with Kali Linux Videos/07. ANTIVIRUS EVASION/7.2. AV Evasion in Practice/7.2.2. Automating the Process.mp427.26MB
  • PEN-200 - Penetration Testing with Kali Linux Videos/08. PASSWORD ATTACKS/8.1. Attacking Network Services Logins/8.1.1. SSH and RDP.mp414.45MB
  • PEN-200 - Penetration Testing with Kali Linux Videos/08. PASSWORD ATTACKS/8.1. Attacking Network Services Logins/8.1.2. HTTP POST Login Form.mp420.86MB
  • PEN-200 - Penetration Testing with Kali Linux Videos/08. PASSWORD ATTACKS/8.2. Password Cracking Fundamentals/8.2.1. Introduction to Encryption, Hashes and Cracking.mp420.87MB
  • PEN-200 - Penetration Testing with Kali Linux Videos/08. PASSWORD ATTACKS/8.2. Password Cracking Fundamentals/8.2.2. Mutating Wordlists.mp432.16MB
  • PEN-200 - Penetration Testing with Kali Linux Videos/08. PASSWORD ATTACKS/8.2. Password Cracking Fundamentals/8.2.3. Password Manager.mp429.03MB
  • PEN-200 - Penetration Testing with Kali Linux Videos/08. PASSWORD ATTACKS/8.2. Password Cracking Fundamentals/8.2.4. SSH Private Key Passphrase.mp433.54MB
  • PEN-200 - Penetration Testing with Kali Linux Videos/08. PASSWORD ATTACKS/8.3. Working with Password Hashes/8.3.1. Cracking NTLM.mp426.83MB
  • PEN-200 - Penetration Testing with Kali Linux Videos/08. PASSWORD ATTACKS/8.3. Working with Password Hashes/8.3.2. Passing NTLM.mp428.52MB
  • PEN-200 - Penetration Testing with Kali Linux Videos/08. PASSWORD ATTACKS/8.3. Working with Password Hashes/8.3.3. Cracking Net-NTLMv2.mp421.66MB
  • PEN-200 - Penetration Testing with Kali Linux Videos/08. PASSWORD ATTACKS/8.3. Working with Password Hashes/8.3.4. Relaying Net-NTLMv2.mp417.58MB
  • PEN-200 - Penetration Testing with Kali Linux Videos/09. FIXING EXPLOITS/9.1. Fixing Memory Corruption Exploits/9.1.1. Importing and Examining the Exploit.mp47.77MB
  • PEN-200 - Penetration Testing with Kali Linux Videos/09. FIXING EXPLOITS/9.1. Fixing Memory Corruption Exploits/9.1.2. Cross-Compiling Exploit Code.mp47.83MB
  • PEN-200 - Penetration Testing with Kali Linux Videos/09. FIXING EXPLOITS/9.1. Fixing Memory Corruption Exploits/9.1.3. Fixing the Exploit.mp433.26MB
  • PEN-200 - Penetration Testing with Kali Linux Videos/09. FIXING EXPLOITS/9.1. Fixing Memory Corruption Exploits/9.1.4. Changing the Overflow Buffer.mp418.57MB
  • PEN-200 - Penetration Testing with Kali Linux Videos/09. FIXING EXPLOITS/9.2. Fixing Web Exploits/9.2.1. Selecting the Vulnerability and Fixing the Code.mp414.27MB
  • PEN-200 - Penetration Testing with Kali Linux Videos/09. FIXING EXPLOITS/9.2. Fixing Web Exploits/9.2.2. Troubleshooting the 'index out of range' Error.mp416.46MB
  • PEN-200 - Penetration Testing with Kali Linux Videos/10. LOCATING PUBLIC EXPLOITS/10.1. Offline Exploit Resources/10.1.1. SearchSploit.mp417.89MB
  • PEN-200 - Penetration Testing with Kali Linux Videos/10. LOCATING PUBLIC EXPLOITS/10.1. Offline Exploit Resources/10.1.2. Nmap NSE Scripts.mp44.41MB
  • PEN-200 - Penetration Testing with Kali Linux Videos/10. LOCATING PUBLIC EXPLOITS/10.2. Exploiting a Target/10.2.1. Putting It Together.mp434.5MB
  • PEN-200 - Penetration Testing with Kali Linux Videos/11. WINDOWS PRIVILEGE ESCALATION/11.1. Enumerating Windows/11.1.1. Situational Awareness.mp465.03MB
  • PEN-200 - Penetration Testing with Kali Linux Videos/11. WINDOWS PRIVILEGE ESCALATION/11.1. Enumerating Windows/11.1.2. Hidden in Plain View.mp433.75MB
  • PEN-200 - Penetration Testing with Kali Linux Videos/11. WINDOWS PRIVILEGE ESCALATION/11.1. Enumerating Windows/11.1.3. Information Goldmine PowerShell.mp437.34MB
  • PEN-200 - Penetration Testing with Kali Linux Videos/11. WINDOWS PRIVILEGE ESCALATION/11.1. Enumerating Windows/11.1.4. Automated Enumeration.mp424.77MB
  • PEN-200 - Penetration Testing with Kali Linux Videos/11. WINDOWS PRIVILEGE ESCALATION/11.2. Leveraging Windows Services/11.2.1. Service Binary Hijacking.mp465.84MB
  • PEN-200 - Penetration Testing with Kali Linux Videos/11. WINDOWS PRIVILEGE ESCALATION/11.2. Leveraging Windows Services/11.2.2. Service DLL Hijacking.mp469.73MB
  • PEN-200 - Penetration Testing with Kali Linux Videos/11. WINDOWS PRIVILEGE ESCALATION/11.2. Leveraging Windows Services/11.2.3. Unquoted Service Paths.mp448.84MB
  • PEN-200 - Penetration Testing with Kali Linux Videos/11. WINDOWS PRIVILEGE ESCALATION/11.3. Abusing Other Windows Components/11.3.1. Scheduled Tasks.mp421.13MB
  • PEN-200 - Penetration Testing with Kali Linux Videos/11. WINDOWS PRIVILEGE ESCALATION/11.3. Abusing Other Windows Components/11.3.2. Using Exploits.mp422.33MB
  • PEN-200 - Penetration Testing with Kali Linux Videos/12. LINUX PRIVILEGE ESCALATION/12.1. Enumerating Linux/12.1.2. Automated Enumeration.mp411.26MB
  • PEN-200 - Penetration Testing with Kali Linux Videos/12. LINUX PRIVILEGE ESCALATION/12.2. Exposed Confidential Information/12.2.1. Inspecting User Trails.mp416.89MB
  • PEN-200 - Penetration Testing with Kali Linux Videos/12. LINUX PRIVILEGE ESCALATION/12.2. Exposed Confidential Information/12.2.2. Inspecting Service Footprints.mp47.67MB
  • PEN-200 - Penetration Testing with Kali Linux Videos/12. LINUX PRIVILEGE ESCALATION/12.3. Insecure File Permissions/12.3.1. Abusing Cron Jobs.mp410.34MB
  • PEN-200 - Penetration Testing with Kali Linux Videos/12. LINUX PRIVILEGE ESCALATION/12.3. Insecure File Permissions/12.3.2. Abusing Password Authentication.mp47.02MB
  • PEN-200 - Penetration Testing with Kali Linux Videos/12. LINUX PRIVILEGE ESCALATION/12.4. Insecure System Components/12.4.1. Abusing Setuid Binaries and Capabilities.mp420.98MB
  • PEN-200 - Penetration Testing with Kali Linux Videos/12. LINUX PRIVILEGE ESCALATION/12.4. Insecure System Components/12.4.2. Abusing Sudo.mp415.17MB
  • PEN-200 - Penetration Testing with Kali Linux Videos/12. LINUX PRIVILEGE ESCALATION/12.4. Insecure System Components/12.4.3. Exploiting Kernel Vulnerabilities.mp415.9MB
  • PEN-200 - Penetration Testing with Kali Linux Videos/13. PORT REDIRECTION AND SSH TUNNELING/13.1. Port Forwarding with Linux Tools/13.1.1. A Simple Port Forwarding Scenario.mp47.68MB
  • PEN-200 - Penetration Testing with Kali Linux Videos/13. PORT REDIRECTION AND SSH TUNNELING/13.1. Port Forwarding with Linux Tools/13.1.2. Setting Up the Lab Environment.mp434.37MB
  • PEN-200 - Penetration Testing with Kali Linux Videos/13. PORT REDIRECTION AND SSH TUNNELING/13.1. Port Forwarding with Linux Tools/13.1.3. Port Forwarding with Socat.mp429.55MB
  • PEN-200 - Penetration Testing with Kali Linux Videos/13. PORT REDIRECTION AND SSH TUNNELING/13.2. SSH Tunneling/13.2.1. SSH Local Port Forwarding.mp446.46MB
  • PEN-200 - Penetration Testing with Kali Linux Videos/13. PORT REDIRECTION AND SSH TUNNELING/13.2. SSH Tunneling/13.2.2. SSH Dynamic Port Forwarding.mp426.28MB
  • PEN-200 - Penetration Testing with Kali Linux Videos/13. PORT REDIRECTION AND SSH TUNNELING/13.2. SSH Tunneling/13.2.3. SSH Remote Port Forwarding.mp417.29MB
  • PEN-200 - Penetration Testing with Kali Linux Videos/13. PORT REDIRECTION AND SSH TUNNELING/13.2. SSH Tunneling/13.2.4. SSH Remote Dynamic Port Forwarding.mp415.9MB
  • PEN-200 - Penetration Testing with Kali Linux Videos/13. PORT REDIRECTION AND SSH TUNNELING/13.2. SSH Tunneling/13.2.5. Using sshuttle.mp47.12MB
  • PEN-200 - Penetration Testing with Kali Linux Videos/13. PORT REDIRECTION AND SSH TUNNELING/13.3. Port Forwarding with Windows Tools/13.3.1. ssh.exe.mp412.46MB
  • PEN-200 - Penetration Testing with Kali Linux Videos/13. PORT REDIRECTION AND SSH TUNNELING/13.3. Port Forwarding with Windows Tools/13.3.2. Plink.mp419.93MB
  • PEN-200 - Penetration Testing with Kali Linux Videos/13. PORT REDIRECTION AND SSH TUNNELING/13.3. Port Forwarding with Windows Tools/13.3.3. Netsh.mp424.06MB
  • PEN-200 - Penetration Testing with Kali Linux Videos/14. TUNNELING THROUGH DEEP PACKET INSPECTION/14.1. HTTP Tunneling Theory and Practice/14.1.1. HTTP Tunneling Fundamentals.mp44.66MB
  • PEN-200 - Penetration Testing with Kali Linux Videos/14. TUNNELING THROUGH DEEP PACKET INSPECTION/14.1. HTTP Tunneling Theory and Practice/14.1.2. HTTP Tunneling with Chisel.mp424.32MB
  • PEN-200 - Penetration Testing with Kali Linux Videos/14. TUNNELING THROUGH DEEP PACKET INSPECTION/14.2. DNS Tunneling Theory and Practice/14.2.1. DNS Tunneling Fundamentals.mp444.04MB
  • PEN-200 - Penetration Testing with Kali Linux Videos/14. TUNNELING THROUGH DEEP PACKET INSPECTION/14.2. DNS Tunneling Theory and Practice/14.2.2. DNS Tunneling with dnscat2.mp425.15MB
  • PEN-200 - Penetration Testing with Kali Linux Videos/15. THE METASPLOIT FRAMEWORK/15.1. Getting Familiar with Metasploit/15.1.1. Setup and Work with MSF.mp417.19MB
  • PEN-200 - Penetration Testing with Kali Linux Videos/15. THE METASPLOIT FRAMEWORK/15.1. Getting Familiar with Metasploit/15.1.2. Auxiliary Modules.mp428.57MB
  • PEN-200 - Penetration Testing with Kali Linux Videos/15. THE METASPLOIT FRAMEWORK/15.1. Getting Familiar with Metasploit/15.1.3. Exploit Modules.mp432.12MB
  • PEN-200 - Penetration Testing with Kali Linux Videos/15. THE METASPLOIT FRAMEWORK/15.2. Using Metasploit Payloads/15.2.1. Staged vs Non-Staged Payloads.mp410.38MB
  • PEN-200 - Penetration Testing with Kali Linux Videos/15. THE METASPLOIT FRAMEWORK/15.2. Using Metasploit Payloads/15.2.2. Meterpreter Payload.mp449.32MB
  • PEN-200 - Penetration Testing with Kali Linux Videos/15. THE METASPLOIT FRAMEWORK/15.2. Using Metasploit Payloads/15.2.3. Executable Payloads.mp424.82MB
  • PEN-200 - Penetration Testing with Kali Linux Videos/15. THE METASPLOIT FRAMEWORK/15.3. Performing Post-Exploitation with Metasploit/15.3.1. Core Meterpreter Post-Exploitation Features.mp439.85MB
  • PEN-200 - Penetration Testing with Kali Linux Videos/15. THE METASPLOIT FRAMEWORK/15.3. Performing Post-Exploitation with Metasploit/15.3.2. Post-Exploitation Modules.mp433.01MB
  • PEN-200 - Penetration Testing with Kali Linux Videos/15. THE METASPLOIT FRAMEWORK/15.3. Performing Post-Exploitation with Metasploit/15.3.3. Pivoting with Metasploit.mp437.19MB
  • PEN-200 - Penetration Testing with Kali Linux Videos/15. THE METASPLOIT FRAMEWORK/15.4. Automating Metasploit/15.4.1. Resource Scripts.mp417.63MB
  • PEN-200 - Penetration Testing with Kali Linux Videos/16. ACTIVE DIRECTORY INTRODUCTION AND ENUMERATION/16.1. Active Directory - Manual Enumeration/16.1.1. Active Directory - Enumeration Using Legacy Windows Tools.mp49.89MB
  • PEN-200 - Penetration Testing with Kali Linux Videos/16. ACTIVE DIRECTORY INTRODUCTION AND ENUMERATION/16.1. Active Directory - Manual Enumeration/16.1.2. Enumerating Active Directory using PowerShell and .NET Classes.mp420.79MB
  • PEN-200 - Penetration Testing with Kali Linux Videos/16. ACTIVE DIRECTORY INTRODUCTION AND ENUMERATION/16.1. Active Directory - Manual Enumeration/16.1.3. Adding Search Functionality to our Script.mp455.43MB
  • PEN-200 - Penetration Testing with Kali Linux Videos/16. ACTIVE DIRECTORY INTRODUCTION AND ENUMERATION/16.1. Active Directory - Manual Enumeration/16.1.4. AD Enumeration with PowerView.mp49.83MB
  • PEN-200 - Penetration Testing with Kali Linux Videos/16. ACTIVE DIRECTORY INTRODUCTION AND ENUMERATION/16.2. Manual Enumeration - Expanding our Repertoire/16.2.1. Enumerating Operating Systems.mp44.15MB
  • PEN-200 - Penetration Testing with Kali Linux Videos/16. ACTIVE DIRECTORY INTRODUCTION AND ENUMERATION/16.2. Manual Enumeration - Expanding our Repertoire/16.2.2. Getting an Overview - Permissions and Logged on Users.mp434.05MB
  • PEN-200 - Penetration Testing with Kali Linux Videos/16. ACTIVE DIRECTORY INTRODUCTION AND ENUMERATION/16.2. Manual Enumeration - Expanding our Repertoire/16.2.3. Enumeration Through Service Principal Names.mp46.61MB
  • PEN-200 - Penetration Testing with Kali Linux Videos/16. ACTIVE DIRECTORY INTRODUCTION AND ENUMERATION/16.2. Manual Enumeration - Expanding our Repertoire/16.2.4. Enumerating Object Permissions.mp419.45MB
  • PEN-200 - Penetration Testing with Kali Linux Videos/16. ACTIVE DIRECTORY INTRODUCTION AND ENUMERATION/16.2. Manual Enumeration - Expanding our Repertoire/16.2.5. Enumerating Domain Shares.mp415.32MB
  • PEN-200 - Penetration Testing with Kali Linux Videos/16. ACTIVE DIRECTORY INTRODUCTION AND ENUMERATION/16.3. Active Directory - Automated Enumeration/16.3.1. Collecting Data with SharpHound.mp48.51MB
  • PEN-200 - Penetration Testing with Kali Linux Videos/16. ACTIVE DIRECTORY INTRODUCTION AND ENUMERATION/16.3. Active Directory - Automated Enumeration/16.3.2. Analysing Data using BloodHound.mp446.81MB
  • PEN-200 - Penetration Testing with Kali Linux Videos/17. ATTACKING ACTIVE DIRECTORY AUTHENTICATION/17.1. Understanding Active Directory Authentication/17.1.1. Cached AD Credentials.mp417.88MB
  • PEN-200 - Penetration Testing with Kali Linux Videos/17. ATTACKING ACTIVE DIRECTORY AUTHENTICATION/17.2. Performing Attacks on Active Directory Authentication/17.2.1. Password Attacks.mp430.33MB
  • PEN-200 - Penetration Testing with Kali Linux Videos/17. ATTACKING ACTIVE DIRECTORY AUTHENTICATION/17.2. Performing Attacks on Active Directory Authentication/17.2.2. AS-REP Roasting.mp416.95MB
  • PEN-200 - Penetration Testing with Kali Linux Videos/17. ATTACKING ACTIVE DIRECTORY AUTHENTICATION/17.2. Performing Attacks on Active Directory Authentication/17.2.3. Kerberoasting.mp424.87MB
  • PEN-200 - Penetration Testing with Kali Linux Videos/17. ATTACKING ACTIVE DIRECTORY AUTHENTICATION/17.2. Performing Attacks on Active Directory Authentication/17.2.4. Silver Tickets.mp423.56MB
  • PEN-200 - Penetration Testing with Kali Linux Videos/17. ATTACKING ACTIVE DIRECTORY AUTHENTICATION/17.2. Performing Attacks on Active Directory Authentication/17.2.5. Domain Controller Synchronization.mp414.26MB
  • PEN-200 - Penetration Testing with Kali Linux Videos/18. LATERAL MOVEMENT IN ACTIVE DIRECTORY/18.1. Active Directory Lateral Movement Techniques/18.1.1. WMI and WinRM.mp429.12MB
  • PEN-200 - Penetration Testing with Kali Linux Videos/18. LATERAL MOVEMENT IN ACTIVE DIRECTORY/18.1. Active Directory Lateral Movement Techniques/18.1.2. PsExec.mp44.49MB
  • PEN-200 - Penetration Testing with Kali Linux Videos/18. LATERAL MOVEMENT IN ACTIVE DIRECTORY/18.1. Active Directory Lateral Movement Techniques/18.1.3. Pass the Hash.mp43.62MB
  • PEN-200 - Penetration Testing with Kali Linux Videos/18. LATERAL MOVEMENT IN ACTIVE DIRECTORY/18.1. Active Directory Lateral Movement Techniques/18.1.4. Overpass the Hash.mp422.01MB
  • PEN-200 - Penetration Testing with Kali Linux Videos/18. LATERAL MOVEMENT IN ACTIVE DIRECTORY/18.1. Active Directory Lateral Movement Techniques/18.1.5. Pass the Ticket.mp420.84MB
  • PEN-200 - Penetration Testing with Kali Linux Videos/18. LATERAL MOVEMENT IN ACTIVE DIRECTORY/18.1. Active Directory Lateral Movement Techniques/18.1.6. DCOM.mp410.2MB
  • PEN-200 - Penetration Testing with Kali Linux Videos/18. LATERAL MOVEMENT IN ACTIVE DIRECTORY/18.2. Active Directory Persistence/18.2.1. Golden Ticket.mp417.63MB
  • PEN-200 - Penetration Testing with Kali Linux Videos/18. LATERAL MOVEMENT IN ACTIVE DIRECTORY/18.2. Active Directory Persistence/18.2.2. Shadow Copies.mp49.79MB