BITCQ

UD666

Size: 11.9 GB
Magnet link

Name Size
UD666/practical-ethical-hacking/01 Course Resources/001 Course Resources.html 1 KB
UD666/practical-ethical-hacking/01 Course Resources/001 Practical-Ethical-Hacking-FAQ.pdf 163 KB
UD666/practical-ethical-hacking/01 Course Resources/external-assets-links.txt 96 B
UD666/practical-ethical-hacking/02 Introduction/002 Introduction and Course Overview.mp4 10.3 MB
UD666/practical-ethical-hacking/02 Introduction/003 Frequently Asked Questions Guide.mp4 8 MB
UD666/practical-ethical-hacking/02 Introduction/003 Practical-Ethical-Hacking-FAQ.pdf 163 KB
UD666/practical-ethical-hacking/02 Introduction/004 A Day in the Life of an Ethical Hacker.mp4 40.9 MB
UD666/practical-ethical-hacking/02 Introduction/external-assets-links.txt 96 B
UD666/practical-ethical-hacking/03 Note Keeping/005 Part 1 Effective Note Keeping.mp4 49.3 MB
UD666/practical-ethical-hacking/03 Note Keeping/006 Part 2 Important Tools.mp4 38.7 MB
UD666/practical-ethical-hacking/03 Note Keeping/external-assets-links.txt 220 B
UD666/practical-ethical-hacking/04 Networking Refresher/007 Introduction.mp4 3.5 MB
UD666/practical-ethical-hacking/04 Networking Refresher/008 IP Addresses.mp4 78.3 MB
UD666/practical-ethical-hacking/04 Networking Refresher/009 MAC Addresses.mp4 28.7 MB
UD666/practical-ethical-hacking/04 Networking Refresher/010 TCP UDP and the Three-Way Handshake.mp4 21.7 MB
UD666/practical-ethical-hacking/04 Networking Refresher/011 Common Ports and Protocols.mp4 16.7 MB
UD666/practical-ethical-hacking/04 Networking Refresher/012 The OSI Model.mp4 12.5 MB
UD666/practical-ethical-hacking/04 Networking Refresher/013 Subnet-Guide.xlsx 15 KB
UD666/practical-ethical-hacking/04 Networking Refresher/013 Subnetting Part 1 - Methodology.mp4 207.9 MB
UD666/practical-ethical-hacking/04 Networking Refresher/014 Subnetting Part 2 - Hands-On Challenge.mp4 36.2 MB
UD666/practical-ethical-hacking/04 Networking Refresher/external-assets-links.txt 73 B
UD666/practical-ethical-hacking/05 Setting Up Our Lab/015 Installing VMWare Virtualbox.mp4 54.8 MB
UD666/practical-ethical-hacking/05 Setting Up Our Lab/016 Linux Image Repository (UPDATE).mp4 3.3 MB
UD666/practical-ethical-hacking/05 Setting Up Our Lab/017 Installing Kali Linux.mp4 45.2 MB
UD666/practical-ethical-hacking/05 Setting Up Our Lab/external-assets-links.txt 379 B
UD666/practical-ethical-hacking/06 Introduction to Linux/018 Exploring Kali Linux.mp4 70.3 MB
UD666/practical-ethical-hacking/06 Introduction to Linux/019 Navigating the File System.mp4 113.4 MB
UD666/practical-ethical-hacking/06 Introduction to Linux/020 Users and Privileges.mp4 94.2 MB
UD666/practical-ethical-hacking/06 Introduction to Linux/021 Common Network Commands.mp4 63.7 MB
UD666/practical-ethical-hacking/06 Introduction to Linux/022 Viewing Creating and Editing Files.mp4 39.9 MB
UD666/practical-ethical-hacking/06 Introduction to Linux/023 Starting and Stopping Kali Services.mp4 82.2 MB
UD666/practical-ethical-hacking/06 Introduction to Linux/024 Installing and Updating Tools.mp4 75.5 MB
UD666/practical-ethical-hacking/06 Introduction to Linux/025 ipsweep.sh 213 B
UD666/practical-ethical-hacking/06 Introduction to Linux/025 Scripting with Bash.mp4 133.3 MB
UD666/practical-ethical-hacking/07 Introduction to Python/026 Introduction.mp4 7.7 MB
UD666/practical-ethical-hacking/07 Introduction to Python/027 Strings.mp4 55 MB
UD666/practical-ethical-hacking/07 Introduction to Python/028 Math.mp4 43.3 MB
UD666/practical-ethical-hacking/07 Introduction to Python/029 Variables Methods.mp4 110.6 MB
UD666/practical-ethical-hacking/07 Introduction to Python/030 Functions.mp4 97.2 MB
UD666/practical-ethical-hacking/07 Introduction to Python/031 Boolean Expressions.mp4 37.4 MB
UD666/practical-ethical-hacking/07 Introduction to Python/032 Relational and Boolean Operators.mp4 74.9 MB
UD666/practical-ethical-hacking/07 Introduction to Python/033 Conditional Statements.mp4 122.5 MB
UD666/practical-ethical-hacking/07 Introduction to Python/034 Lists.mp4 143.1 MB
UD666/practical-ethical-hacking/07 Introduction to Python/035 Tuples.mp4 31.8 MB
UD666/practical-ethical-hacking/07 Introduction to Python/036 Looping.mp4 58.7 MB
UD666/practical-ethical-hacking/07 Introduction to Python/037 Importing Modules.mp4 50.9 MB
UD666/practical-ethical-hacking/07 Introduction to Python/038 Advanced Strings.mp4 145.4 MB
UD666/practical-ethical-hacking/07 Introduction to Python/039 Dictionaries.mp4 114.6 MB
UD666/practical-ethical-hacking/07 Introduction to Python/040 Sockets.mp4 47.4 MB
UD666/practical-ethical-hacking/07 Introduction to Python/041 Building a Port Scanner.mp4 247.6 MB
UD666/practical-ethical-hacking/08 The Ethical Hacker Methodology/042 The Five Stages of Ethical Hacking.mp4 13.6 MB
UD666/practical-ethical-hacking/09 Information Gathering (Reconnaissance)/043 Passive Reconnaissance Overview.mp4 21.3 MB
UD666/practical-ethical-hacking/09 Information Gathering (Reconnaissance)/044 Identifying Our Target.mp4 42.9 MB
UD666/practical-ethical-hacking/09 Information Gathering (Reconnaissance)/045 E-Mail Address Gathering with Hunter.io.mp4 20.4 MB
UD666/practical-ethical-hacking/09 Information Gathering (Reconnaissance)/046 Gathering Breached Credentials with Breach-Parse.mp4 69.8 MB
UD666/practical-ethical-hacking/09 Information Gathering (Reconnaissance)/047 Utilizing theharvester.mp4 51 MB
UD666/practical-ethical-hacking/09 Information Gathering (Reconnaissance)/048 Hunting Subdomains - Part 1.mp4 79.5 MB
UD666/practical-ethical-hacking/09 Information Gathering (Reconnaissance)/049 Hunting Subdomains - Part 2.mp4 65.9 MB
UD666/practical-ethical-hacking/09 Information Gathering (Reconnaissance)/050 Identifying Website Technologies.mp4 96.4 MB
UD666/practical-ethical-hacking/09 Information Gathering (Reconnaissance)/051 Information Gathering with Burp Suite.mp4 105.7 MB
UD666/practical-ethical-hacking/09 Information Gathering (Reconnaissance)/052 Google Fu.mp4 58.4 MB
UD666/practical-ethical-hacking/09 Information Gathering (Reconnaissance)/053 Utilizing Social Media.mp4 40.2 MB
UD666/practical-ethical-hacking/10 Scanning Enumeration/054 Installing Kioptrix Level 1.mp4 44.8 MB
UD666/practical-ethical-hacking/10 Scanning Enumeration/055 Scanning with Nmap.mp4 133.2 MB
UD666/practical-ethical-hacking/10 Scanning Enumeration/056 Enumerating HTTPHTTPS - Part 1.mp4 111.2 MB
UD666/practical-ethical-hacking/10 Scanning Enumeration/057 Enumerating HTTPHTTPS - Part 2.mp4 150.6 MB
UD666/practical-ethical-hacking/10 Scanning Enumeration/058 Enumerating SMB.mp4 90.3 MB
UD666/practical-ethical-hacking/10 Scanning Enumeration/059 Enumerating SSH.mp4 31.1 MB
UD666/practical-ethical-hacking/10 Scanning Enumeration/060 Researching Potential Vulnerabilities.mp4 138.5 MB
UD666/practical-ethical-hacking/10 Scanning Enumeration/061 Our Notes so Far.mp4 16.1 MB
UD666/practical-ethical-hacking/11 Additional Scanning Tools/062 Scanning with Masscan.mp4 26.5 MB
UD666/practical-ethical-hacking/11 Additional Scanning Tools/063 Scanning with Metasploit.mp4 22.7 MB
UD666/practical-ethical-hacking/11 Additional Scanning Tools/064 Scanning with Nessus - Part 1.mp4 98.9 MB
UD666/practical-ethical-hacking/11 Additional Scanning Tools/065 Scanning with Nessus - Part 2.mp4 50.6 MB
UD666/practical-ethical-hacking/12 Exploitation Basics/066 Reverse Shells vs Bind Shells.mp4 37 MB
UD666/practical-ethical-hacking/12 Exploitation Basics/067 Staged vs Non-Staged Payloads.mp4 12.6 MB
UD666/practical-ethical-hacking/12 Exploitation Basics/068 Gaining Root with Metasploit.mp4 54.1 MB
UD666/practical-ethical-hacking/12 Exploitation Basics/069 Manual Exploitation.mp4 136.3 MB
UD666/practical-ethical-hacking/12 Exploitation Basics/070 Brute Force Attacks.mp4 93.1 MB
UD666/practical-ethical-hacking/12 Exploitation Basics/071 Password Spraying and Credential Stuffing.mp4 156.7 MB
UD666/practical-ethical-hacking/12 Exploitation Basics/072 Our Notes Revisited.mp4 17.3 MB
UD666/practical-ethical-hacking/13 Mid-Course Capstone/073 Introduction.mp4 75.9 MB
UD666/practical-ethical-hacking/13 Mid-Course Capstone/074 Walkthrough - Legacy.mp4 331.9 MB
UD666/practical-ethical-hacking/13 Mid-Course Capstone/075 Walkthrough - Lame.mp4 280 MB
UD666/practical-ethical-hacking/13 Mid-Course Capstone/076 Walkthrough - Blue.mp4 284.2 MB
UD666/practical-ethical-hacking/13 Mid-Course Capstone/077 Walkthrough - Devel.mp4 246.7 MB
UD666/practical-ethical-hacking/13 Mid-Course Capstone/078 Walkthrough - Jerry.mp4 305.4 MB
UD666/practical-ethical-hacking/13 Mid-Course Capstone/079 Walkthrough - Nibbles.mp4 285.4 MB
UD666/practical-ethical-hacking/13 Mid-Course Capstone/080 Walkthrough - Optimum.mp4 235.6 MB
UD666/practical-ethical-hacking/13 Mid-Course Capstone/081 Walkthrough - Bashed.mp4 242.3 MB
UD666/practical-ethical-hacking/13 Mid-Course Capstone/082 Walkthrough - Grandpa.mp4 163.3 MB
UD666/practical-ethical-hacking/13 Mid-Course Capstone/083 Walkthrough - Netmon.mp4 233.9 MB
UD666/practical-ethical-hacking/13 Mid-Course Capstone/external-assets-links.txt 69 B
UD666/practical-ethical-hacking/14 Introduction to Exploit Development (Buffer Overflows)/084 Required Installations.mp4 58.4 MB
UD666/practical-ethical-hacking/14 Introduction to Exploit Development (Buffer Overflows)/085 Buffer Overflows Explained.mp4 30.2 MB
UD666/practical-ethical-hacking/14 Introduction to Exploit Development (Buffer Overflows)/086 Spiking.mp4 60.3 MB
UD666/practical-ethical-hacking/14 Introduction to Exploit Development (Buffer Overflows)/087 Fuzzing.mp4 29.5 MB
UD666/practical-ethical-hacking/14 Introduction to Exploit Development (Buffer Overflows)/088 Finding the Offset.mp4 42.2 MB
UD666/practical-ethical-hacking/14 Introduction to Exploit Development (Buffer Overflows)/089 Overwriting the EIP.mp4 16.7 MB
UD666/practical-ethical-hacking/14 Introduction to Exploit Development (Buffer Overflows)/090 Finding Bad Characters.mp4 44.8 MB
UD666/practical-ethical-hacking/14 Introduction to Exploit Development (Buffer Overflows)/091 Finding the Right Module.mp4 65.9 MB
UD666/practical-ethical-hacking/14 Introduction to Exploit Development (Buffer Overflows)/092 Generating Shellcode and Getting Root.mp4 35.1 MB
UD666/practical-ethical-hacking/15 Active Directory Overview/093 Active Directory Overview.mp4 22.5 MB
UD666/practical-ethical-hacking/15 Active Directory Overview/094 Physical Active Directory Components.mp4 20 MB
UD666/practical-ethical-hacking/15 Active Directory Overview/095 Logical Active Directory Components.mp4 22.9 MB
UD666/practical-ethical-hacking/16 Active Directory Lab Build/096 Lab Overview and Requirements.mp4 7.6 MB
UD666/practical-ethical-hacking/16 Active Directory Lab Build/097 Downloading Necessary ISOs.mp4 17.8 MB
UD666/practical-ethical-hacking/16 Active Directory Lab Build/098 Setting Up the Domain Controller.mp4 76.2 MB
UD666/practical-ethical-hacking/16 Active Directory Lab Build/099 Setting Up the User Machines.mp4 35.7 MB
UD666/practical-ethical-hacking/16 Active Directory Lab Build/100 Setting Up Users Groups and Policies.mp4 99.7 MB
UD666/practical-ethical-hacking/16 Active Directory Lab Build/101 Joining Our Machines to the Domain.mp4 79.3 MB
UD666/practical-ethical-hacking/17 Attacking Active Directory Initial Attack Vectors/102 Introduction.mp4 25.7 MB
UD666/practical-ethical-hacking/17 Attacking Active Directory Initial Attack Vectors/103 LLMNR Poisoning Overview.mp4 45.7 MB
UD666/practical-ethical-hacking/17 Attacking Active Directory Initial Attack Vectors/104 Capturing NTLMv2 Hashes with Responder.mp4 52.8 MB
UD666/practical-ethical-hacking/17 Attacking Active Directory Initial Attack Vectors/105 Password Cracking with Hashcat.mp4 154.3 MB
UD666/practical-ethical-hacking/17 Attacking Active Directory Initial Attack Vectors/106 LLMNR Poisoning Defenses.mp4 18.3 MB
UD666/practical-ethical-hacking/17 Attacking Active Directory Initial Attack Vectors/107 SMB Relay Attacks Overview.mp4 26.9 MB
UD666/practical-ethical-hacking/17 Attacking Active Directory Initial Attack Vectors/108 Quick Lab Update.mp4 9.3 MB
UD666/practical-ethical-hacking/17 Attacking Active Directory Initial Attack Vectors/109 Discovering Hosts with SMB Signing Disabled.mp4 42.2 MB
UD666/practical-ethical-hacking/17 Attacking Active Directory Initial Attack Vectors/110 SMB Relay Attack Demonstration Part 1.mp4 52.1 MB
UD666/practical-ethical-hacking/17 Attacking Active Directory Initial Attack Vectors/111 SMB Relay Attack Demonstration Part 2.mp4 29.6 MB
UD666/practical-ethical-hacking/17 Attacking Active Directory Initial Attack Vectors/112 SMB Relay Attack Defenses.mp4 12.7 MB
UD666/practical-ethical-hacking/17 Attacking Active Directory Initial Attack Vectors/113 Gaining Shell Access.mp4 61.3 MB
UD666/practical-ethical-hacking/17 Attacking Active Directory Initial Attack Vectors/114 IPv6 Attacks Overview.mp4 9.2 MB
UD666/practical-ethical-hacking/17 Attacking Active Directory Initial Attack Vectors/115 Installing mitm6.mp4 13.5 MB
UD666/practical-ethical-hacking/17 Attacking Active Directory Initial Attack Vectors/116 Setting Up LDAPS.mp4 12.9 MB
UD666/practical-ethical-hacking/17 Attacking Active Directory Initial Attack Vectors/117 IPv6 DNS Takeover via mitm6.mp4 86.8 MB
UD666/practical-ethical-hacking/17 Attacking Active Directory Initial Attack Vectors/118 IPv6 Attack Defenses.mp4 19.9 MB
UD666/practical-ethical-hacking/17 Attacking Active Directory Initial Attack Vectors/119 Other Attack Vectors and Strategies.mp4 27 MB
UD666/practical-ethical-hacking/17 Attacking Active Directory Initial Attack Vectors/external-assets-links.txt 451 B
UD666/practical-ethical-hacking/18 Attacking Active Directory Post-Compromise Enumeration/120 Introduction.mp4 3.5 MB
UD666/practical-ethical-hacking/18 Attacking Active Directory Post-Compromise Enumeration/121 PowerView Overview.mp4 20.1 MB
UD666/practical-ethical-hacking/18 Attacking Active Directory Post-Compromise Enumeration/122 Domain Enumeration with PowerView.mp4 139.5 MB
UD666/practical-ethical-hacking/18 Attacking Active Directory Post-Compromise Enumeration/123 Bloodhound Overview and Setup.mp4 35.9 MB
UD666/practical-ethical-hacking/18 Attacking Active Directory Post-Compromise Enumeration/124 Grabbing Data with Invoke-Bloodhound.mp4 31.6 MB
UD666/practical-ethical-hacking/18 Attacking Active Directory Post-Compromise Enumeration/125 Enumerating Domain Data with Bloodhound.mp4 34.6 MB
UD666/practical-ethical-hacking/18 Attacking Active Directory Post-Compromise Enumeration/external-assets-links.txt 92 B
UD666/practical-ethical-hacking/19 Attacking Active Directory Post-Compromise Attacks/126 Introduction.mp4 1.9 MB
UD666/practical-ethical-hacking/19 Attacking Active Directory Post-Compromise Attacks/127 Pass the Hash Password Overview.mp4 17.9 MB
UD666/practical-ethical-hacking/19 Attacking Active Directory Post-Compromise Attacks/128 Installing crackmapexec.mp4 8.2 MB
UD666/practical-ethical-hacking/19 Attacking Active Directory Post-Compromise Attacks/129 Pass the Password Attacks.mp4 67.3 MB
UD666/practical-ethical-hacking/19 Attacking Active Directory Post-Compromise Attacks/130 Dumping Hashes with secretsdump.py.mp4 24 MB
UD666/practical-ethical-hacking/19 Attacking Active Directory Post-Compromise Attacks/131 Cracking NTLM Hashes with Hashcat.mp4 27.4 MB
UD666/practical-ethical-hacking/19 Attacking Active Directory Post-Compromise Attacks/132 Pass the Hash Attacks.mp4 53.6 MB
UD666/practical-ethical-hacking/19 Attacking Active Directory Post-Compromise Attacks/133 Pass Attack Mitigations.mp4 14.4 MB
UD666/practical-ethical-hacking/19 Attacking Active Directory Post-Compromise Attacks/134 Token Impersonation Overview.mp4 16.2 MB
UD666/practical-ethical-hacking/19 Attacking Active Directory Post-Compromise Attacks/135 Token Impersonation with Incognito.mp4 48.1 MB
UD666/practical-ethical-hacking/19 Attacking Active Directory Post-Compromise Attacks/136 Token Impersonation Mitigation.mp4 15.2 MB
UD666/practical-ethical-hacking/19 Attacking Active Directory Post-Compromise Attacks/137 Kerberoasting Overview.mp4 25.8 MB
UD666/practical-ethical-hacking/19 Attacking Active Directory Post-Compromise Attacks/138 Kerberoasting Walkthrough.mp4 43.3 MB
UD666/practical-ethical-hacking/19 Attacking Active Directory Post-Compromise Attacks/139 Kerberoasting Mitigation.mp4 7.4 MB
UD666/practical-ethical-hacking/19 Attacking Active Directory Post-Compromise Attacks/140 GPP cPassword Attacks Overview.mp4 21.8 MB
UD666/practical-ethical-hacking/19 Attacking Active Directory Post-Compromise Attacks/141 Abusing GPP Part 1.mp4 63.2 MB
UD666/practical-ethical-hacking/19 Attacking Active Directory Post-Compromise Attacks/142 Abusing GPP Part 2.mp4 41.6 MB
UD666/practical-ethical-hacking/19 Attacking Active Directory Post-Compromise Attacks/143 Mimikatz Overview.mp4 33.1 MB
UD666/practical-ethical-hacking/19 Attacking Active Directory Post-Compromise Attacks/144 Credential Dumping with Mimikatz.mp4 72.3 MB
UD666/practical-ethical-hacking/19 Attacking Active Directory Post-Compromise Attacks/145 Golden Ticket Attacks.mp4 52.3 MB
UD666/practical-ethical-hacking/19 Attacking Active Directory Post-Compromise Attacks/146 Conclusion and Additional Resources.mp4 70 MB
UD666/practical-ethical-hacking/19 Attacking Active Directory Post-Compromise Attacks/external-assets-links.txt 571 B
UD666/practical-ethical-hacking/20 Post Exploitation/147 Introduction.mp4 2.8 MB
UD666/practical-ethical-hacking/20 Post Exploitation/148 File Transfers Review.mp4 8 MB
UD666/practical-ethical-hacking/20 Post Exploitation/149 Maintaining Access Overview.mp4 7.8 MB
UD666/practical-ethical-hacking/20 Post Exploitation/150 Pivoting Lab Setup.mp4 59.1 MB
UD666/practical-ethical-hacking/20 Post Exploitation/151 Pivoting Walkthrough.mp4 52.1 MB
UD666/practical-ethical-hacking/20 Post Exploitation/152 Cleaning Up.mp4 5.6 MB
UD666/practical-ethical-hacking/21 Web Application Enumeration Revisited/153 Introduction.mp4 3.6 MB
UD666/practical-ethical-hacking/21 Web Application Enumeration Revisited/154 Installing Go.mp4 48.9 MB
UD666/practical-ethical-hacking/21 Web Application Enumeration Revisited/155 Finding Subdomains with Assetfinder.mp4 36.4 MB
UD666/practical-ethical-hacking/21 Web Application Enumeration Revisited/156 Finding Subdomains with Amass.mp4 57 MB
UD666/practical-ethical-hacking/21 Web Application Enumeration Revisited/157 Finding Alive Domains with Httprobe.mp4 75.7 MB
UD666/practical-ethical-hacking/21 Web Application Enumeration Revisited/158 Screenshotting Websites with GoWitness.mp4 33.7 MB
UD666/practical-ethical-hacking/21 Web Application Enumeration Revisited/159 Automating the Enumeration Process.mp4 59.5 MB
UD666/practical-ethical-hacking/21 Web Application Enumeration Revisited/external-assets-links.txt 119 B
UD666/practical-ethical-hacking/22 Testing the Top 10 Web Application Vulnerabilities/160 Introduction.mp4 3.9 MB
UD666/practical-ethical-hacking/22 Testing the Top 10 Web Application Vulnerabilities/161 The OWASP Top 10 and OWASP Testing Checklist.mp4 130.4 MB
UD666/practical-ethical-hacking/22 Testing the Top 10 Web Application Vulnerabilities/162 Installing OWASP Juice Shop.mp4 88.6 MB
UD666/practical-ethical-hacking/22 Testing the Top 10 Web Application Vulnerabilities/163 Installing Foxy Proxy.mp4 27.1 MB
UD666/practical-ethical-hacking/22 Testing the Top 10 Web Application Vulnerabilities/164 Exploring Burp Suite.mp4 106 MB
UD666/practical-ethical-hacking/22 Testing the Top 10 Web Application Vulnerabilities/165 Introducing the Score Board.mp4 30.7 MB
UD666/practical-ethical-hacking/22 Testing the Top 10 Web Application Vulnerabilities/166 SQL Injection Attacks Overview.mp4 19.2 MB
UD666/practical-ethical-hacking/22 Testing the Top 10 Web Application Vulnerabilities/167 SQL Injection Walkthrough.mp4 85.2 MB
UD666/practical-ethical-hacking/22 Testing the Top 10 Web Application Vulnerabilities/168 SQL Injection Defenses.mp4 9.3 MB
UD666/practical-ethical-hacking/22 Testing the Top 10 Web Application Vulnerabilities/169 Broken Authentication Overview and Defenses.mp4 78.6 MB
UD666/practical-ethical-hacking/22 Testing the Top 10 Web Application Vulnerabilities/170 Testing for Broken Authentication.mp4 63.5 MB
UD666/practical-ethical-hacking/22 Testing the Top 10 Web Application Vulnerabilities/171 Sensitive Data Exposure Overview and Defenses.mp4 66.7 MB
UD666/practical-ethical-hacking/22 Testing the Top 10 Web Application Vulnerabilities/172 Testing for Sensitive Data Exposure.mp4 79.9 MB
UD666/practical-ethical-hacking/22 Testing the Top 10 Web Application Vulnerabilities/173 XML External Entities (XXE) Overview.mp4 28.2 MB
UD666/practical-ethical-hacking/22 Testing the Top 10 Web Application Vulnerabilities/174 XXE Attack and Defense.mp4 77.4 MB
UD666/practical-ethical-hacking/22 Testing the Top 10 Web Application Vulnerabilities/175 Broken Access Control Overview.mp4 48.5 MB
UD666/practical-ethical-hacking/22 Testing the Top 10 Web Application Vulnerabilities/176 Broken Access Control Walkthrough.mp4 35.5 MB
UD666/practical-ethical-hacking/22 Testing the Top 10 Web Application Vulnerabilities/177 Security Misconfiguration Attacks and Defenses.mp4 68.2 MB
UD666/practical-ethical-hacking/22 Testing the Top 10 Web Application Vulnerabilities/178 Cross-Site Scripting (XSS) Overview.mp4 81.9 MB
UD666/practical-ethical-hacking/22 Testing the Top 10 Web Application Vulnerabilities/179 Reflected XSS Walkthrough.mp4 73.6 MB
UD666/practical-ethical-hacking/22 Testing the Top 10 Web Application Vulnerabilities/180 Stored XSS Walkthrough.mp4 49.1 MB
UD666/practical-ethical-hacking/22 Testing the Top 10 Web Application Vulnerabilities/181 Preventing XSS.mp4 11.9 MB
UD666/practical-ethical-hacking/22 Testing the Top 10 Web Application Vulnerabilities/182 Insecure Deserialization.mp4 57.3 MB
UD666/practical-ethical-hacking/22 Testing the Top 10 Web Application Vulnerabilities/183 Using Components with Known Vulnerabilities.mp4 52.9 MB
UD666/practical-ethical-hacking/22 Testing the Top 10 Web Application Vulnerabilities/184 Insufficient Logging and Monitoring.mp4 40.5 MB
UD666/practical-ethical-hacking/22 Testing the Top 10 Web Application Vulnerabilities/external-assets-links.txt 2 KB
UD666/practical-ethical-hacking/23 Wireless Penetration Testing/185 Wireless Penetration Testing Overview.mp4 48.4 MB
UD666/practical-ethical-hacking/23 Wireless Penetration Testing/186 WPA PSK Exploit Walkthrough.mp4 126.9 MB
UD666/practical-ethical-hacking/24 Legal Documents and Report Writing/187 Common Legal Documents.mp4 25.4 MB
UD666/practical-ethical-hacking/24 Legal Documents and Report Writing/188 Demo-Company-Security-Assessment-Findings-Report.pdf 319 KB
UD666/practical-ethical-hacking/24 Legal Documents and Report Writing/188 Pentest Report Writing.mp4 62.6 MB
UD666/practical-ethical-hacking/24 Legal Documents and Report Writing/189 Reviewing a Real Pentest Report.mp4 79.3 MB
UD666/practical-ethical-hacking/24 Legal Documents and Report Writing/external-assets-links.txt 103 B
UD666/practical-ethical-hacking/25 Career Advice/190 Career Advice.mp4 36.5 MB
UD666/practical-ethical-hacking/26 BONUS Section/191 BONUS LECTURE Course Discord Channel and Other Author Resources.mp4 42.5 MB
UD666/practical-ethical-hacking/26 BONUS Section/external-assets-links.txt 96 B
Name
udp://tracker.coppersurfer.tk:6969/announce
udp://tracker.open-internet.nl:6969/announce
udp://tracker.leechers-paradise.org:6969/announce
udp://exodus.desync.com:6969/announce
udp://tracker.internetwarriors.net:1337/announce
udp://tracker.opentrackr.org:1337/announce
udp://9.rarbg.to:2710/announce
udp://9.rarbg.me:2710/announce
http://tracker3.itzmx.com:6961/announce
http://tracker1.itzmx.com:8080/announce
udp://thetracker.org:80/announce
udp://open.demonii.si:1337/announce
udp://bt.xxx-tracker.com:2710/announce
udp://tracker.torrent.eu.org:451/announce
udp://tracker.cyberia.is:6969/announce
udp://tracker.tiny-vps.com:6969/announce
udp://denis.stalker.upeer.me:6969/announce
http://open.acgnxtracker.com:80/announce
udp://ipv4.tracker.harry.lu:80/announce
udp://explodie.org:6969/announce
udp://tracker.opentrackr.org:1337/announce
udp://tracker.zer0day.to:1337/announce
udp://tracker.coppersurfer.tk:6969/announce
udp://tracker.leechers-paradise.org:6969/announce
udp://tracker.internetwarriors.net:1337/announce
udp://mgtracker.org:6969/announce
udp://explodie.org:6969/announce
Name Size Peers
UD666 Video 11.9 GB 3

Loading...