UD666/practical-ethical-hacking/01 Course Resources/001 Course Resources.html |
1 KB |
UD666/practical-ethical-hacking/01 Course Resources/001 Practical-Ethical-Hacking-FAQ.pdf |
163 KB |
UD666/practical-ethical-hacking/01 Course Resources/external-assets-links.txt |
96 B |
UD666/practical-ethical-hacking/02 Introduction/002 Introduction and Course Overview.mp4 |
10.3 MB |
UD666/practical-ethical-hacking/02 Introduction/003 Frequently Asked Questions Guide.mp4 |
8 MB |
UD666/practical-ethical-hacking/02 Introduction/003 Practical-Ethical-Hacking-FAQ.pdf |
163 KB |
UD666/practical-ethical-hacking/02 Introduction/004 A Day in the Life of an Ethical Hacker.mp4 |
40.9 MB |
UD666/practical-ethical-hacking/02 Introduction/external-assets-links.txt |
96 B |
UD666/practical-ethical-hacking/03 Note Keeping/005 Part 1 Effective Note Keeping.mp4 |
49.3 MB |
UD666/practical-ethical-hacking/03 Note Keeping/006 Part 2 Important Tools.mp4 |
38.7 MB |
UD666/practical-ethical-hacking/03 Note Keeping/external-assets-links.txt |
220 B |
UD666/practical-ethical-hacking/04 Networking Refresher/007 Introduction.mp4 |
3.5 MB |
UD666/practical-ethical-hacking/04 Networking Refresher/008 IP Addresses.mp4 |
78.3 MB |
UD666/practical-ethical-hacking/04 Networking Refresher/009 MAC Addresses.mp4 |
28.7 MB |
UD666/practical-ethical-hacking/04 Networking Refresher/010 TCP UDP and the Three-Way Handshake.mp4 |
21.7 MB |
UD666/practical-ethical-hacking/04 Networking Refresher/011 Common Ports and Protocols.mp4 |
16.7 MB |
UD666/practical-ethical-hacking/04 Networking Refresher/012 The OSI Model.mp4 |
12.5 MB |
UD666/practical-ethical-hacking/04 Networking Refresher/013 Subnet-Guide.xlsx |
15 KB |
UD666/practical-ethical-hacking/04 Networking Refresher/013 Subnetting Part 1 - Methodology.mp4 |
207.9 MB |
UD666/practical-ethical-hacking/04 Networking Refresher/014 Subnetting Part 2 - Hands-On Challenge.mp4 |
36.2 MB |
UD666/practical-ethical-hacking/04 Networking Refresher/external-assets-links.txt |
73 B |
UD666/practical-ethical-hacking/05 Setting Up Our Lab/015 Installing VMWare Virtualbox.mp4 |
54.8 MB |
UD666/practical-ethical-hacking/05 Setting Up Our Lab/016 Linux Image Repository (UPDATE).mp4 |
3.3 MB |
UD666/practical-ethical-hacking/05 Setting Up Our Lab/017 Installing Kali Linux.mp4 |
45.2 MB |
UD666/practical-ethical-hacking/05 Setting Up Our Lab/external-assets-links.txt |
379 B |
UD666/practical-ethical-hacking/06 Introduction to Linux/018 Exploring Kali Linux.mp4 |
70.3 MB |
UD666/practical-ethical-hacking/06 Introduction to Linux/019 Navigating the File System.mp4 |
113.4 MB |
UD666/practical-ethical-hacking/06 Introduction to Linux/020 Users and Privileges.mp4 |
94.2 MB |
UD666/practical-ethical-hacking/06 Introduction to Linux/021 Common Network Commands.mp4 |
63.7 MB |
UD666/practical-ethical-hacking/06 Introduction to Linux/022 Viewing Creating and Editing Files.mp4 |
39.9 MB |
UD666/practical-ethical-hacking/06 Introduction to Linux/023 Starting and Stopping Kali Services.mp4 |
82.2 MB |
UD666/practical-ethical-hacking/06 Introduction to Linux/024 Installing and Updating Tools.mp4 |
75.5 MB |
UD666/practical-ethical-hacking/06 Introduction to Linux/025 ipsweep.sh |
213 B |
UD666/practical-ethical-hacking/06 Introduction to Linux/025 Scripting with Bash.mp4 |
133.3 MB |
UD666/practical-ethical-hacking/07 Introduction to Python/026 Introduction.mp4 |
7.7 MB |
UD666/practical-ethical-hacking/07 Introduction to Python/027 Strings.mp4 |
55 MB |
UD666/practical-ethical-hacking/07 Introduction to Python/028 Math.mp4 |
43.3 MB |
UD666/practical-ethical-hacking/07 Introduction to Python/029 Variables Methods.mp4 |
110.6 MB |
UD666/practical-ethical-hacking/07 Introduction to Python/030 Functions.mp4 |
97.2 MB |
UD666/practical-ethical-hacking/07 Introduction to Python/031 Boolean Expressions.mp4 |
37.4 MB |
UD666/practical-ethical-hacking/07 Introduction to Python/032 Relational and Boolean Operators.mp4 |
74.9 MB |
UD666/practical-ethical-hacking/07 Introduction to Python/033 Conditional Statements.mp4 |
122.5 MB |
UD666/practical-ethical-hacking/07 Introduction to Python/034 Lists.mp4 |
143.1 MB |
UD666/practical-ethical-hacking/07 Introduction to Python/035 Tuples.mp4 |
31.8 MB |
UD666/practical-ethical-hacking/07 Introduction to Python/036 Looping.mp4 |
58.7 MB |
UD666/practical-ethical-hacking/07 Introduction to Python/037 Importing Modules.mp4 |
50.9 MB |
UD666/practical-ethical-hacking/07 Introduction to Python/038 Advanced Strings.mp4 |
145.4 MB |
UD666/practical-ethical-hacking/07 Introduction to Python/039 Dictionaries.mp4 |
114.6 MB |
UD666/practical-ethical-hacking/07 Introduction to Python/040 Sockets.mp4 |
47.4 MB |
UD666/practical-ethical-hacking/07 Introduction to Python/041 Building a Port Scanner.mp4 |
247.6 MB |
UD666/practical-ethical-hacking/08 The Ethical Hacker Methodology/042 The Five Stages of Ethical Hacking.mp4 |
13.6 MB |
UD666/practical-ethical-hacking/09 Information Gathering (Reconnaissance)/043 Passive Reconnaissance Overview.mp4 |
21.3 MB |
UD666/practical-ethical-hacking/09 Information Gathering (Reconnaissance)/044 Identifying Our Target.mp4 |
42.9 MB |
UD666/practical-ethical-hacking/09 Information Gathering (Reconnaissance)/045 E-Mail Address Gathering with Hunter.io.mp4 |
20.4 MB |
UD666/practical-ethical-hacking/09 Information Gathering (Reconnaissance)/046 Gathering Breached Credentials with Breach-Parse.mp4 |
69.8 MB |
UD666/practical-ethical-hacking/09 Information Gathering (Reconnaissance)/047 Utilizing theharvester.mp4 |
51 MB |
UD666/practical-ethical-hacking/09 Information Gathering (Reconnaissance)/048 Hunting Subdomains - Part 1.mp4 |
79.5 MB |
UD666/practical-ethical-hacking/09 Information Gathering (Reconnaissance)/049 Hunting Subdomains - Part 2.mp4 |
65.9 MB |
UD666/practical-ethical-hacking/09 Information Gathering (Reconnaissance)/050 Identifying Website Technologies.mp4 |
96.4 MB |
UD666/practical-ethical-hacking/09 Information Gathering (Reconnaissance)/051 Information Gathering with Burp Suite.mp4 |
105.7 MB |
UD666/practical-ethical-hacking/09 Information Gathering (Reconnaissance)/052 Google Fu.mp4 |
58.4 MB |
UD666/practical-ethical-hacking/09 Information Gathering (Reconnaissance)/053 Utilizing Social Media.mp4 |
40.2 MB |
UD666/practical-ethical-hacking/10 Scanning Enumeration/054 Installing Kioptrix Level 1.mp4 |
44.8 MB |
UD666/practical-ethical-hacking/10 Scanning Enumeration/055 Scanning with Nmap.mp4 |
133.2 MB |
UD666/practical-ethical-hacking/10 Scanning Enumeration/056 Enumerating HTTPHTTPS - Part 1.mp4 |
111.2 MB |
UD666/practical-ethical-hacking/10 Scanning Enumeration/057 Enumerating HTTPHTTPS - Part 2.mp4 |
150.6 MB |
UD666/practical-ethical-hacking/10 Scanning Enumeration/058 Enumerating SMB.mp4 |
90.3 MB |
UD666/practical-ethical-hacking/10 Scanning Enumeration/059 Enumerating SSH.mp4 |
31.1 MB |
UD666/practical-ethical-hacking/10 Scanning Enumeration/060 Researching Potential Vulnerabilities.mp4 |
138.5 MB |
UD666/practical-ethical-hacking/10 Scanning Enumeration/061 Our Notes so Far.mp4 |
16.1 MB |
UD666/practical-ethical-hacking/11 Additional Scanning Tools/062 Scanning with Masscan.mp4 |
26.5 MB |
UD666/practical-ethical-hacking/11 Additional Scanning Tools/063 Scanning with Metasploit.mp4 |
22.7 MB |
UD666/practical-ethical-hacking/11 Additional Scanning Tools/064 Scanning with Nessus - Part 1.mp4 |
98.9 MB |
UD666/practical-ethical-hacking/11 Additional Scanning Tools/065 Scanning with Nessus - Part 2.mp4 |
50.6 MB |
UD666/practical-ethical-hacking/12 Exploitation Basics/066 Reverse Shells vs Bind Shells.mp4 |
37 MB |
UD666/practical-ethical-hacking/12 Exploitation Basics/067 Staged vs Non-Staged Payloads.mp4 |
12.6 MB |
UD666/practical-ethical-hacking/12 Exploitation Basics/068 Gaining Root with Metasploit.mp4 |
54.1 MB |
UD666/practical-ethical-hacking/12 Exploitation Basics/069 Manual Exploitation.mp4 |
136.3 MB |
UD666/practical-ethical-hacking/12 Exploitation Basics/070 Brute Force Attacks.mp4 |
93.1 MB |
UD666/practical-ethical-hacking/12 Exploitation Basics/071 Password Spraying and Credential Stuffing.mp4 |
156.7 MB |
UD666/practical-ethical-hacking/12 Exploitation Basics/072 Our Notes Revisited.mp4 |
17.3 MB |
UD666/practical-ethical-hacking/13 Mid-Course Capstone/073 Introduction.mp4 |
75.9 MB |
UD666/practical-ethical-hacking/13 Mid-Course Capstone/074 Walkthrough - Legacy.mp4 |
331.9 MB |
UD666/practical-ethical-hacking/13 Mid-Course Capstone/075 Walkthrough - Lame.mp4 |
280 MB |
UD666/practical-ethical-hacking/13 Mid-Course Capstone/076 Walkthrough - Blue.mp4 |
284.2 MB |
UD666/practical-ethical-hacking/13 Mid-Course Capstone/077 Walkthrough - Devel.mp4 |
246.7 MB |
UD666/practical-ethical-hacking/13 Mid-Course Capstone/078 Walkthrough - Jerry.mp4 |
305.4 MB |
UD666/practical-ethical-hacking/13 Mid-Course Capstone/079 Walkthrough - Nibbles.mp4 |
285.4 MB |
UD666/practical-ethical-hacking/13 Mid-Course Capstone/080 Walkthrough - Optimum.mp4 |
235.6 MB |
UD666/practical-ethical-hacking/13 Mid-Course Capstone/081 Walkthrough - Bashed.mp4 |
242.3 MB |
UD666/practical-ethical-hacking/13 Mid-Course Capstone/082 Walkthrough - Grandpa.mp4 |
163.3 MB |
UD666/practical-ethical-hacking/13 Mid-Course Capstone/083 Walkthrough - Netmon.mp4 |
233.9 MB |
UD666/practical-ethical-hacking/13 Mid-Course Capstone/external-assets-links.txt |
69 B |
UD666/practical-ethical-hacking/14 Introduction to Exploit Development (Buffer Overflows)/084 Required Installations.mp4 |
58.4 MB |
UD666/practical-ethical-hacking/14 Introduction to Exploit Development (Buffer Overflows)/085 Buffer Overflows Explained.mp4 |
30.2 MB |
UD666/practical-ethical-hacking/14 Introduction to Exploit Development (Buffer Overflows)/086 Spiking.mp4 |
60.3 MB |
UD666/practical-ethical-hacking/14 Introduction to Exploit Development (Buffer Overflows)/087 Fuzzing.mp4 |
29.5 MB |
UD666/practical-ethical-hacking/14 Introduction to Exploit Development (Buffer Overflows)/088 Finding the Offset.mp4 |
42.2 MB |
UD666/practical-ethical-hacking/14 Introduction to Exploit Development (Buffer Overflows)/089 Overwriting the EIP.mp4 |
16.7 MB |
UD666/practical-ethical-hacking/14 Introduction to Exploit Development (Buffer Overflows)/090 Finding Bad Characters.mp4 |
44.8 MB |
UD666/practical-ethical-hacking/14 Introduction to Exploit Development (Buffer Overflows)/091 Finding the Right Module.mp4 |
65.9 MB |
UD666/practical-ethical-hacking/14 Introduction to Exploit Development (Buffer Overflows)/092 Generating Shellcode and Getting Root.mp4 |
35.1 MB |
UD666/practical-ethical-hacking/15 Active Directory Overview/093 Active Directory Overview.mp4 |
22.5 MB |
UD666/practical-ethical-hacking/15 Active Directory Overview/094 Physical Active Directory Components.mp4 |
20 MB |
UD666/practical-ethical-hacking/15 Active Directory Overview/095 Logical Active Directory Components.mp4 |
22.9 MB |
UD666/practical-ethical-hacking/16 Active Directory Lab Build/096 Lab Overview and Requirements.mp4 |
7.6 MB |
UD666/practical-ethical-hacking/16 Active Directory Lab Build/097 Downloading Necessary ISOs.mp4 |
17.8 MB |
UD666/practical-ethical-hacking/16 Active Directory Lab Build/098 Setting Up the Domain Controller.mp4 |
76.2 MB |
UD666/practical-ethical-hacking/16 Active Directory Lab Build/099 Setting Up the User Machines.mp4 |
35.7 MB |
UD666/practical-ethical-hacking/16 Active Directory Lab Build/100 Setting Up Users Groups and Policies.mp4 |
99.7 MB |
UD666/practical-ethical-hacking/16 Active Directory Lab Build/101 Joining Our Machines to the Domain.mp4 |
79.3 MB |
UD666/practical-ethical-hacking/17 Attacking Active Directory Initial Attack Vectors/102 Introduction.mp4 |
25.7 MB |
UD666/practical-ethical-hacking/17 Attacking Active Directory Initial Attack Vectors/103 LLMNR Poisoning Overview.mp4 |
45.7 MB |
UD666/practical-ethical-hacking/17 Attacking Active Directory Initial Attack Vectors/104 Capturing NTLMv2 Hashes with Responder.mp4 |
52.8 MB |
UD666/practical-ethical-hacking/17 Attacking Active Directory Initial Attack Vectors/105 Password Cracking with Hashcat.mp4 |
154.3 MB |
UD666/practical-ethical-hacking/17 Attacking Active Directory Initial Attack Vectors/106 LLMNR Poisoning Defenses.mp4 |
18.3 MB |
UD666/practical-ethical-hacking/17 Attacking Active Directory Initial Attack Vectors/107 SMB Relay Attacks Overview.mp4 |
26.9 MB |
UD666/practical-ethical-hacking/17 Attacking Active Directory Initial Attack Vectors/108 Quick Lab Update.mp4 |
9.3 MB |
UD666/practical-ethical-hacking/17 Attacking Active Directory Initial Attack Vectors/109 Discovering Hosts with SMB Signing Disabled.mp4 |
42.2 MB |
UD666/practical-ethical-hacking/17 Attacking Active Directory Initial Attack Vectors/110 SMB Relay Attack Demonstration Part 1.mp4 |
52.1 MB |
UD666/practical-ethical-hacking/17 Attacking Active Directory Initial Attack Vectors/111 SMB Relay Attack Demonstration Part 2.mp4 |
29.6 MB |
UD666/practical-ethical-hacking/17 Attacking Active Directory Initial Attack Vectors/112 SMB Relay Attack Defenses.mp4 |
12.7 MB |
UD666/practical-ethical-hacking/17 Attacking Active Directory Initial Attack Vectors/113 Gaining Shell Access.mp4 |
61.3 MB |
UD666/practical-ethical-hacking/17 Attacking Active Directory Initial Attack Vectors/114 IPv6 Attacks Overview.mp4 |
9.2 MB |
UD666/practical-ethical-hacking/17 Attacking Active Directory Initial Attack Vectors/115 Installing mitm6.mp4 |
13.5 MB |
UD666/practical-ethical-hacking/17 Attacking Active Directory Initial Attack Vectors/116 Setting Up LDAPS.mp4 |
12.9 MB |
UD666/practical-ethical-hacking/17 Attacking Active Directory Initial Attack Vectors/117 IPv6 DNS Takeover via mitm6.mp4 |
86.8 MB |
UD666/practical-ethical-hacking/17 Attacking Active Directory Initial Attack Vectors/118 IPv6 Attack Defenses.mp4 |
19.9 MB |
UD666/practical-ethical-hacking/17 Attacking Active Directory Initial Attack Vectors/119 Other Attack Vectors and Strategies.mp4 |
27 MB |
UD666/practical-ethical-hacking/17 Attacking Active Directory Initial Attack Vectors/external-assets-links.txt |
451 B |
UD666/practical-ethical-hacking/18 Attacking Active Directory Post-Compromise Enumeration/120 Introduction.mp4 |
3.5 MB |
UD666/practical-ethical-hacking/18 Attacking Active Directory Post-Compromise Enumeration/121 PowerView Overview.mp4 |
20.1 MB |
UD666/practical-ethical-hacking/18 Attacking Active Directory Post-Compromise Enumeration/122 Domain Enumeration with PowerView.mp4 |
139.5 MB |
UD666/practical-ethical-hacking/18 Attacking Active Directory Post-Compromise Enumeration/123 Bloodhound Overview and Setup.mp4 |
35.9 MB |
UD666/practical-ethical-hacking/18 Attacking Active Directory Post-Compromise Enumeration/124 Grabbing Data with Invoke-Bloodhound.mp4 |
31.6 MB |
UD666/practical-ethical-hacking/18 Attacking Active Directory Post-Compromise Enumeration/125 Enumerating Domain Data with Bloodhound.mp4 |
34.6 MB |
UD666/practical-ethical-hacking/18 Attacking Active Directory Post-Compromise Enumeration/external-assets-links.txt |
92 B |
UD666/practical-ethical-hacking/19 Attacking Active Directory Post-Compromise Attacks/126 Introduction.mp4 |
1.9 MB |
UD666/practical-ethical-hacking/19 Attacking Active Directory Post-Compromise Attacks/127 Pass the Hash Password Overview.mp4 |
17.9 MB |
UD666/practical-ethical-hacking/19 Attacking Active Directory Post-Compromise Attacks/128 Installing crackmapexec.mp4 |
8.2 MB |
UD666/practical-ethical-hacking/19 Attacking Active Directory Post-Compromise Attacks/129 Pass the Password Attacks.mp4 |
67.3 MB |
UD666/practical-ethical-hacking/19 Attacking Active Directory Post-Compromise Attacks/130 Dumping Hashes with secretsdump.py.mp4 |
24 MB |
UD666/practical-ethical-hacking/19 Attacking Active Directory Post-Compromise Attacks/131 Cracking NTLM Hashes with Hashcat.mp4 |
27.4 MB |
UD666/practical-ethical-hacking/19 Attacking Active Directory Post-Compromise Attacks/132 Pass the Hash Attacks.mp4 |
53.6 MB |
UD666/practical-ethical-hacking/19 Attacking Active Directory Post-Compromise Attacks/133 Pass Attack Mitigations.mp4 |
14.4 MB |
UD666/practical-ethical-hacking/19 Attacking Active Directory Post-Compromise Attacks/134 Token Impersonation Overview.mp4 |
16.2 MB |
UD666/practical-ethical-hacking/19 Attacking Active Directory Post-Compromise Attacks/135 Token Impersonation with Incognito.mp4 |
48.1 MB |
UD666/practical-ethical-hacking/19 Attacking Active Directory Post-Compromise Attacks/136 Token Impersonation Mitigation.mp4 |
15.2 MB |
UD666/practical-ethical-hacking/19 Attacking Active Directory Post-Compromise Attacks/137 Kerberoasting Overview.mp4 |
25.8 MB |
UD666/practical-ethical-hacking/19 Attacking Active Directory Post-Compromise Attacks/138 Kerberoasting Walkthrough.mp4 |
43.3 MB |
UD666/practical-ethical-hacking/19 Attacking Active Directory Post-Compromise Attacks/139 Kerberoasting Mitigation.mp4 |
7.4 MB |
UD666/practical-ethical-hacking/19 Attacking Active Directory Post-Compromise Attacks/140 GPP cPassword Attacks Overview.mp4 |
21.8 MB |
UD666/practical-ethical-hacking/19 Attacking Active Directory Post-Compromise Attacks/141 Abusing GPP Part 1.mp4 |
63.2 MB |
UD666/practical-ethical-hacking/19 Attacking Active Directory Post-Compromise Attacks/142 Abusing GPP Part 2.mp4 |
41.6 MB |
UD666/practical-ethical-hacking/19 Attacking Active Directory Post-Compromise Attacks/143 Mimikatz Overview.mp4 |
33.1 MB |
UD666/practical-ethical-hacking/19 Attacking Active Directory Post-Compromise Attacks/144 Credential Dumping with Mimikatz.mp4 |
72.3 MB |
UD666/practical-ethical-hacking/19 Attacking Active Directory Post-Compromise Attacks/145 Golden Ticket Attacks.mp4 |
52.3 MB |
UD666/practical-ethical-hacking/19 Attacking Active Directory Post-Compromise Attacks/146 Conclusion and Additional Resources.mp4 |
70 MB |
UD666/practical-ethical-hacking/19 Attacking Active Directory Post-Compromise Attacks/external-assets-links.txt |
571 B |
UD666/practical-ethical-hacking/20 Post Exploitation/147 Introduction.mp4 |
2.8 MB |
UD666/practical-ethical-hacking/20 Post Exploitation/148 File Transfers Review.mp4 |
8 MB |
UD666/practical-ethical-hacking/20 Post Exploitation/149 Maintaining Access Overview.mp4 |
7.8 MB |
UD666/practical-ethical-hacking/20 Post Exploitation/150 Pivoting Lab Setup.mp4 |
59.1 MB |
UD666/practical-ethical-hacking/20 Post Exploitation/151 Pivoting Walkthrough.mp4 |
52.1 MB |
UD666/practical-ethical-hacking/20 Post Exploitation/152 Cleaning Up.mp4 |
5.6 MB |
UD666/practical-ethical-hacking/21 Web Application Enumeration Revisited/153 Introduction.mp4 |
3.6 MB |
UD666/practical-ethical-hacking/21 Web Application Enumeration Revisited/154 Installing Go.mp4 |
48.9 MB |
UD666/practical-ethical-hacking/21 Web Application Enumeration Revisited/155 Finding Subdomains with Assetfinder.mp4 |
36.4 MB |
UD666/practical-ethical-hacking/21 Web Application Enumeration Revisited/156 Finding Subdomains with Amass.mp4 |
57 MB |
UD666/practical-ethical-hacking/21 Web Application Enumeration Revisited/157 Finding Alive Domains with Httprobe.mp4 |
75.7 MB |
UD666/practical-ethical-hacking/21 Web Application Enumeration Revisited/158 Screenshotting Websites with GoWitness.mp4 |
33.7 MB |
UD666/practical-ethical-hacking/21 Web Application Enumeration Revisited/159 Automating the Enumeration Process.mp4 |
59.5 MB |
UD666/practical-ethical-hacking/21 Web Application Enumeration Revisited/external-assets-links.txt |
119 B |
UD666/practical-ethical-hacking/22 Testing the Top 10 Web Application Vulnerabilities/160 Introduction.mp4 |
3.9 MB |
UD666/practical-ethical-hacking/22 Testing the Top 10 Web Application Vulnerabilities/161 The OWASP Top 10 and OWASP Testing Checklist.mp4 |
130.4 MB |
UD666/practical-ethical-hacking/22 Testing the Top 10 Web Application Vulnerabilities/162 Installing OWASP Juice Shop.mp4 |
88.6 MB |
UD666/practical-ethical-hacking/22 Testing the Top 10 Web Application Vulnerabilities/163 Installing Foxy Proxy.mp4 |
27.1 MB |
UD666/practical-ethical-hacking/22 Testing the Top 10 Web Application Vulnerabilities/164 Exploring Burp Suite.mp4 |
106 MB |
UD666/practical-ethical-hacking/22 Testing the Top 10 Web Application Vulnerabilities/165 Introducing the Score Board.mp4 |
30.7 MB |
UD666/practical-ethical-hacking/22 Testing the Top 10 Web Application Vulnerabilities/166 SQL Injection Attacks Overview.mp4 |
19.2 MB |
UD666/practical-ethical-hacking/22 Testing the Top 10 Web Application Vulnerabilities/167 SQL Injection Walkthrough.mp4 |
85.2 MB |
UD666/practical-ethical-hacking/22 Testing the Top 10 Web Application Vulnerabilities/168 SQL Injection Defenses.mp4 |
9.3 MB |
UD666/practical-ethical-hacking/22 Testing the Top 10 Web Application Vulnerabilities/169 Broken Authentication Overview and Defenses.mp4 |
78.6 MB |
UD666/practical-ethical-hacking/22 Testing the Top 10 Web Application Vulnerabilities/170 Testing for Broken Authentication.mp4 |
63.5 MB |
UD666/practical-ethical-hacking/22 Testing the Top 10 Web Application Vulnerabilities/171 Sensitive Data Exposure Overview and Defenses.mp4 |
66.7 MB |
UD666/practical-ethical-hacking/22 Testing the Top 10 Web Application Vulnerabilities/172 Testing for Sensitive Data Exposure.mp4 |
79.9 MB |
UD666/practical-ethical-hacking/22 Testing the Top 10 Web Application Vulnerabilities/173 XML External Entities (XXE) Overview.mp4 |
28.2 MB |
UD666/practical-ethical-hacking/22 Testing the Top 10 Web Application Vulnerabilities/174 XXE Attack and Defense.mp4 |
77.4 MB |
UD666/practical-ethical-hacking/22 Testing the Top 10 Web Application Vulnerabilities/175 Broken Access Control Overview.mp4 |
48.5 MB |
UD666/practical-ethical-hacking/22 Testing the Top 10 Web Application Vulnerabilities/176 Broken Access Control Walkthrough.mp4 |
35.5 MB |
UD666/practical-ethical-hacking/22 Testing the Top 10 Web Application Vulnerabilities/177 Security Misconfiguration Attacks and Defenses.mp4 |
68.2 MB |
UD666/practical-ethical-hacking/22 Testing the Top 10 Web Application Vulnerabilities/178 Cross-Site Scripting (XSS) Overview.mp4 |
81.9 MB |
UD666/practical-ethical-hacking/22 Testing the Top 10 Web Application Vulnerabilities/179 Reflected XSS Walkthrough.mp4 |
73.6 MB |
UD666/practical-ethical-hacking/22 Testing the Top 10 Web Application Vulnerabilities/180 Stored XSS Walkthrough.mp4 |
49.1 MB |
UD666/practical-ethical-hacking/22 Testing the Top 10 Web Application Vulnerabilities/181 Preventing XSS.mp4 |
11.9 MB |
UD666/practical-ethical-hacking/22 Testing the Top 10 Web Application Vulnerabilities/182 Insecure Deserialization.mp4 |
57.3 MB |
UD666/practical-ethical-hacking/22 Testing the Top 10 Web Application Vulnerabilities/183 Using Components with Known Vulnerabilities.mp4 |
52.9 MB |
UD666/practical-ethical-hacking/22 Testing the Top 10 Web Application Vulnerabilities/184 Insufficient Logging and Monitoring.mp4 |
40.5 MB |
UD666/practical-ethical-hacking/22 Testing the Top 10 Web Application Vulnerabilities/external-assets-links.txt |
2 KB |
UD666/practical-ethical-hacking/23 Wireless Penetration Testing/185 Wireless Penetration Testing Overview.mp4 |
48.4 MB |
UD666/practical-ethical-hacking/23 Wireless Penetration Testing/186 WPA PSK Exploit Walkthrough.mp4 |
126.9 MB |
UD666/practical-ethical-hacking/24 Legal Documents and Report Writing/187 Common Legal Documents.mp4 |
25.4 MB |
UD666/practical-ethical-hacking/24 Legal Documents and Report Writing/188 Demo-Company-Security-Assessment-Findings-Report.pdf |
319 KB |
UD666/practical-ethical-hacking/24 Legal Documents and Report Writing/188 Pentest Report Writing.mp4 |
62.6 MB |
UD666/practical-ethical-hacking/24 Legal Documents and Report Writing/189 Reviewing a Real Pentest Report.mp4 |
79.3 MB |
UD666/practical-ethical-hacking/24 Legal Documents and Report Writing/external-assets-links.txt |
103 B |
UD666/practical-ethical-hacking/25 Career Advice/190 Career Advice.mp4 |
36.5 MB |
UD666/practical-ethical-hacking/26 BONUS Section/191 BONUS LECTURE Course Discord Channel and Other Author Resources.mp4 |
42.5 MB |
UD666/practical-ethical-hacking/26 BONUS Section/external-assets-links.txt |
96 B |