1 - Assessment Methodologies/Assessment Methodologies_ Information Gathering/02 - Lessons/03 - Active Information Gathering/01 - vod-3965-assessment-methodologies-information-gathering-012.mp4 169.5 MB
4 - Web Application Penetration Testing/Web Application Penetration Testing_ Introduction to the Web and HTTP Protocol/02 - Intro to Web/01 - Intro to Web/01 - vod-4380-web-app-pen-testing-web-http-002.mp4 168.3 MB
4 - Web Application Penetration Testing/Web Application Penetration Testing_ Introduction to the Web and HTTP Protocol/02 - Intro to Web/02 - Labs/01 - vod-4380-web-app-pen-testing-web-http-003.mp4 133.9 MB
4 - Web Application Penetration Testing/Web Application Penetration Testing_ Introduction to the Web and HTTP Protocol/02 - Intro to Web/02 - Labs/07 - vod-4380-web-app-pen-testing-web-http-006.mp4 129.5 MB
4 - Web Application Penetration Testing/Web Application Penetration Testing_ Introduction to the Web and HTTP Protocol/02 - Intro to Web/02 - Labs/13 - vod-4380-web-app-pen-testing-web-http-009.mp4 116.9 MB
3 - Host & Network Penetration Testing/Host & Network Penetration Testing_ The Metasploit Framework (MSF)/06 - Exploitation/05 - Linux Post Exploitation/10 - vod-4377-host-network-penetration-testing-metasploit-framework-047.mp4 115.7 MB
4 - Web Application Penetration Testing/Web Application Penetration Testing_ Introduction to the Web and HTTP Protocol/02 - Intro to Web/02 - Labs/09 - vod-4380-web-app-pen-testing-web-http-007.mp4 80.8 MB
4 - Web Application Penetration Testing/Web Application Penetration Testing_ Introduction to the Web and HTTP Protocol/02 - Intro to Web/02 - Labs/15 - vod-4380-web-app-pen-testing-web-http-010.mp4 58.2 MB
4 - Web Application Penetration Testing/Web Application Penetration Testing_ Introduction to the Web and HTTP Protocol/02 - Intro to Web/02 - Labs/19 - vod-4380-web-app-pen-testing-web-http-012.mp4 53.5 MB
3 - Host & Network Penetration Testing/Host & Network Penetration Testing_ Post-Exploitation/05 - Transferring Files/01 - Transferring Files To Windows & Linux Targets/07 - vod-4376-host-and-network-penetration-testing-post-exploitation-016.mp4 46.2 MB
1 - Assessment Methodologies/Assessment Methodologies_ Information Gathering/02 - Lessons/02 - Passive Information Gathering/03 - vod-3965-assessment-methodologies-information-gathering-004.mp4 46.0 MB
4 - Web Application Penetration Testing/Web Application Penetration Testing_ Introduction to the Web and HTTP Protocol/02 - Intro to Web/02 - Labs/17 - vod-4380-web-app-pen-testing-web-http-011.mp4 44.5 MB
4 - Web Application Penetration Testing/Web Application Penetration Testing_ Introduction to the Web and HTTP Protocol/02 - Intro to Web/02 - Labs/21 - vod-4380-web-app-pen-testing-web-http-013.mp4 40.9 MB
4 - Web Application Penetration Testing/Web Application Penetration Testing_ Introduction to the Web and HTTP Protocol/02 - Intro to Web/02 - Labs/05 - vod-4380-web-app-pen-testing-web-http-005.mp4 39.5 MB
4 - Web Application Penetration Testing/Web Application Penetration Testing_ Introduction to the Web and HTTP Protocol/02 - Intro to Web/02 - Labs/11 - vod-4380-web-app-pen-testing-web-http-008.mp4 34.1 MB
1 - Assessment Methodologies/Assessment Methodologies_ Information Gathering/02 - Lessons/02 - Passive Information Gathering/08 - vod-3965-assessment-methodologies-information-gathering-007.mp4 33.6 MB
4 - Web Application Penetration Testing/Web Application Penetration Testing_ Introduction to the Web and HTTP Protocol/02 - Intro to Web/02 - Labs/03 - vod-4380-web-app-pen-testing-web-http-004.mp4 28.4 MB
4 - Web Application Penetration Testing/Web Application Penetration Testing_ Introduction to the Web and HTTP Protocol/02 - Intro to Web/02 - Labs/23 - vod-4380-web-app-pen-testing-web-http-014.mp4 27.8 MB
4 - Web Application Penetration Testing/Web Application Penetration Testing_ Introduction to the Web and HTTP Protocol/Intro to Web and HTTP Protocol Course Files.zip 10.5 MB
4 - Web Application Penetration Testing/Web Application Penetration Testing_ Introduction to the Web and HTTP Protocol/01 - Welcome/01 - Introduction/01 - vod-4380-web-app-pen-testing-web-http-001.mp4 9.9 MB
4 - Web Application Penetration Testing/Web Application Penetration Testing_ Introduction to the Web and HTTP Protocol/03 - Goodbye/01 - Conclusion/01 - vod-4380-web-app-pen-testing-web-http-015.mp4 6.6 MB
3 - Host & Network Penetration Testing/Host & Network Penetration Testing_ Post-Exploitation/03 - Windows Enumeration/01 - Windows Local Enumeration/10 - vod-4376-host-and-network-penetration-testing-post-exploitation-007.srt 38.5 KB
4 - Web Application Penetration Testing/Web Application Penetration Testing_ Introduction to the Web and HTTP Protocol/02 - Intro to Web/01 - Intro to Web/01 - vod-4380-web-app-pen-testing-web-http-002.srt 38.4 KB
4 - Web Application Penetration Testing/Web Application Penetration Testing_ Introduction to the Web and HTTP Protocol/02 - Intro to Web/02 - Labs/01 - vod-4380-web-app-pen-testing-web-http-003.srt 37.6 KB
3 - Host & Network Penetration Testing/Host & Network Penetration Testing_ System_Host Based Attacks/03 - Windows/04 - Windows File System Vulnerabilities/01 - vod-4373-host-network-penetration-testing-system-host-based-attacks-015.srt 33.6 KB
3 - Host & Network Penetration Testing/Host & Network Penetration Testing_ Post-Exploitation/03 - Windows Enumeration/01 - Windows Local Enumeration/01 - vod-4376-host-and-network-penetration-testing-post-exploitation-004.srt 33.6 KB
4 - Web Application Penetration Testing/Web Application Penetration Testing_ Introduction to the Web and HTTP Protocol/02 - Intro to Web/02 - Labs/13 - vod-4380-web-app-pen-testing-web-http-009.srt 33.1 KB
3 - Host & Network Penetration Testing/Host & Network Penetration Testing_ The Metasploit Framework (MSF)/06 - Exploitation/04 - Windows Post Exploitation/10 - vod-4377-host-network-penetration-testing-metasploit-framework-037.srt 33.0 KB
3 - Host & Network Penetration Testing/Host & Network Penetration Testing_ The Metasploit Framework (MSF)/06 - Exploitation/05 - Linux Post Exploitation/07 - vod-4377-host-network-penetration-testing-metasploit-framework-046.srt 32.3 KB
3 - Host & Network Penetration Testing/Host & Network Penetration Testing_ Post-Exploitation/05 - Transferring Files/01 - Transferring Files To Windows & Linux Targets/04 - vod-4376-host-and-network-penetration-testing-post-exploitation-015.srt 31.8 KB
3 - Host & Network Penetration Testing/Host & Network Penetration Testing_ The Metasploit Framework (MSF)/06 - Exploitation/04 - Windows Post Exploitation/04 - vod-4377-host-network-penetration-testing-metasploit-framework-035.srt 31.5 KB
4 - Web Application Penetration Testing/Web Application Penetration Testing_ Introduction to the Web and HTTP Protocol/02 - Intro to Web/02 - Labs/07 - vod-4380-web-app-pen-testing-web-http-006.srt 31.5 KB
4 - Web Application Penetration Testing/Web Application Penetration Testing_ Introduction to the Web and HTTP Protocol/02 - Intro to Web/02 - Labs/15 - vod-4380-web-app-pen-testing-web-http-010.srt 19.1 KB
4 - Web Application Penetration Testing/Web Application Penetration Testing_ Introduction to the Web and HTTP Protocol/02 - Intro to Web/02 - Labs/09 - vod-4380-web-app-pen-testing-web-http-007.srt 16.3 KB
3 - Host & Network Penetration Testing/Host & Network Penetration Testing_ The Metasploit Framework (MSF)/06 - Exploitation/05 - Linux Post Exploitation/12 - Establishing Persistence On Linux_lab.json 16.2 KB
3 - Host & Network Penetration Testing/Host & Network Penetration Testing_ Post-Exploitation/03 - Windows Enumeration/01 - Windows Local Enumeration/15 - Automating Windows Local Enumeration_lab.html 15.9 KB
1 - Assessment Methodologies/Assessment Methodologies_ Information Gathering/02 - Lessons/02 - Passive Information Gathering/15 - vod-3965-assessment-methodologies-information-gathering-011.srt 15.6 KB
1 - Assessment Methodologies/Assessment Methodologies_ Information Gathering/02 - Lessons/02 - Passive Information Gathering/08 - vod-3965-assessment-methodologies-information-gathering-007.srt 15.5 KB
4 - Web Application Penetration Testing/Web Application Penetration Testing_ Introduction to the Web and HTTP Protocol/02 - Intro to Web/02 - Labs/21 - vod-4380-web-app-pen-testing-web-http-013.srt 15.1 KB
4 - Web Application Penetration Testing/Web Application Penetration Testing_ Introduction to the Web and HTTP Protocol/02 - Intro to Web/02 - Labs/17 - vod-4380-web-app-pen-testing-web-http-011.srt 14.7 KB
3 - Host & Network Penetration Testing/Host & Network Penetration Testing_ Post-Exploitation/03 - Windows Enumeration/01 - Windows Local Enumeration/12 - Enumerating Processes & Services_lab.json 14.7 KB
4 - Web Application Penetration Testing/Web Application Penetration Testing_ Introduction to the Web and HTTP Protocol/02 - Intro to Web/02 - Labs/19 - vod-4380-web-app-pen-testing-web-http-012.srt 14.5 KB
3 - Host & Network Penetration Testing/Host & Network Penetration Testing_ Post-Exploitation/04 - Linux Enumeration/01 - Linux Local Enumeration/09 - Enumerating Network Information_lab.json 14.4 KB
3 - Host & Network Penetration Testing/Host & Network Penetration Testing_ Post-Exploitation/04 - Linux Enumeration/01 - Linux Local Enumeration/03 - Enumerating System Information_lab.json 14.1 KB
4 - Web Application Penetration Testing/Web Application Penetration Testing_ Introduction to the Web and HTTP Protocol/web-application-penetration-testing-introduction-to-the-web-and-http-protocol.json 11.7 KB
3 - Host & Network Penetration Testing/Host & Network Penetration Testing_ Post-Exploitation/04 - Linux Enumeration/01 - Linux Local Enumeration/15 - Automating Linux Local Enumeration_lab.html 11.7 KB
3 - Host & Network Penetration Testing/Host & Network Penetration Testing_ Post-Exploitation/05 - Transferring Files/01 - Transferring Files To Windows & Linux Targets/06 - Transferring Files To Windows Targets_lab.json 11.5 KB
3 - Host & Network Penetration Testing/Host & Network Penetration Testing_ Social Engineering/02 - Social Engineering/02 - Labs/02 - Let's Go Phishing_lab.html 11.5 KB
3 - Host & Network Penetration Testing/Host & Network Penetration Testing_ Post-Exploitation/04 - Linux Enumeration/01 - Linux Local Enumeration/12 - Enumerating Processes & Cron Jobs_lab.json 11.3 KB
4 - Web Application Penetration Testing/Web Application Penetration Testing_ Introduction to the Web and HTTP Protocol/02 - Intro to Web/02 - Labs/05 - vod-4380-web-app-pen-testing-web-http-005.srt 11.3 KB
4 - Web Application Penetration Testing/Web Application Penetration Testing_ Introduction to the Web and HTTP Protocol/02 - Intro to Web/02 - Labs/11 - vod-4380-web-app-pen-testing-web-http-008.srt 10.2 KB
4 - Web Application Penetration Testing/Web Application Penetration Testing_ Introduction to the Web and HTTP Protocol/02 - Intro to Web/02 - Labs/03 - vod-4380-web-app-pen-testing-web-http-004.srt 9.0 KB
3 - Host & Network Penetration Testing/Host & Network Penetration Testing_ The Metasploit Framework (MSF)/04 - Vulnerability Scanning/03 - Web Apps/03 - Web App Vulnerability Scanning With WMAP_lab.json 8.8 KB
4 - Web Application Penetration Testing/Web Application Penetration Testing_ Introduction to the Web and HTTP Protocol/02 - Intro to Web/02 - Labs/23 - vod-4380-web-app-pen-testing-web-http-014.srt 8.5 KB
3 - Host & Network Penetration Testing/Host & Network Penetration Testing_ The Metasploit Framework (MSF)/06 - Exploitation/03 - Post Exploitation Fundamentals/06 - Upgrading Command Shells To Meterpreter Shells_lab.json 8.5 KB
3 - Host & Network Penetration Testing/Host & Network Penetration Testing_ Post-Exploitation/05 - Transferring Files/01 - Transferring Files To Windows & Linux Targets/03 - Setting Up A Web Server With Python_lab.json 4.2 KB
3 - Host & Network Penetration Testing/Host & Network Penetration Testing_ The Metasploit Framework (MSF)/04 - Vulnerability Scanning/03 - Web Apps/03 - Web App Vulnerability Scanning With WMAP_lab.html 4.1 KB
3 - Host & Network Penetration Testing/Host & Network Penetration Testing_ The Metasploit Framework (MSF)/06 - Exploitation/04 - Windows Post Exploitation/18 - Maintaining Access_ Persistence Service_lab.json 3.2 KB
4 - Web Application Penetration Testing/Web Application Penetration Testing_ Introduction to the Web and HTTP Protocol/02 - Intro to Web/02 - Labs/02 - HTTP Method Enumeration_lab.json 3.2 KB
4 - Web Application Penetration Testing/Web Application Penetration Testing_ Introduction to the Web and HTTP Protocol/02 - Intro to Web/02 - Labs/22 - Attacking Basic Auth with Burp Suite_lab.json 3.2 KB
4 - Web Application Penetration Testing/Web Application Penetration Testing_ Introduction to the Web and HTTP Protocol/02 - Intro to Web/02 - Labs/06 - Directory Enumeration with Burp Suite_lab.json 3.1 KB
3 - Host & Network Penetration Testing/Host & Network Penetration Testing_ The Metasploit Framework (MSF)/06 - Exploitation/01 - Windows Exploitation/11 - Windows_ Java Web Server_lab.json 3.1 KB
4 - Web Application Penetration Testing/Web Application Penetration Testing_ Introduction to the Web and HTTP Protocol/02 - Intro to Web/02 - Labs/04 - Directory Enumeration with Gobuster_lab.json 3.1 KB
3 - Host & Network Penetration Testing/Host & Network Penetration Testing_ The Metasploit Framework (MSF)/06 - Exploitation/04 - Windows Post Exploitation/27 - Clearing Windows Event Logs_lab.html 3.1 KB
3 - Host & Network Penetration Testing/Host & Network Penetration Testing_ The Metasploit Framework (MSF)/07 - Armitage/01 - Metasploit GUIs/06 - Exploitation & Post Exploitation With Armitage_lab.html 3.0 KB
4 - Web Application Penetration Testing/Web Application Penetration Testing_ Introduction to the Web and HTTP Protocol/02 - Intro to Web/02 - Labs/12 - Passive Crawling with Burp Suite_lab.json 3.0 KB
4 - Web Application Penetration Testing/Web Application Penetration Testing_ Introduction to the Web and HTTP Protocol/02 - Intro to Web/02 - Labs/18 - Authenticated XSS Attack with XSSer_lab.json 3.0 KB
4 - Web Application Penetration Testing/Web Application Penetration Testing_ Introduction to the Web and HTTP Protocol/02 - Intro to Web/02 - Labs/08 - Scanning Web Application with ZAProxy_lab.json 2.9 KB
4 - Web Application Penetration Testing/Web Application Penetration Testing_ Introduction to the Web and HTTP Protocol/02 - Intro to Web/02 - Labs/16 - XSS Attack with XSSer_lab.json 2.9 KB
4 - Web Application Penetration Testing/Web Application Penetration Testing_ Introduction to the Web and HTTP Protocol/02 - Intro to Web/02 - Labs/14 - SQL Injection with SQLMap_lab.json 2.9 KB
4 - Web Application Penetration Testing/Web Application Penetration Testing_ Introduction to the Web and HTTP Protocol/02 - Intro to Web/02 - Labs/10 - Scanning Web Application with Nikto_lab.json 2.9 KB
4 - Web Application Penetration Testing/Web Application Penetration Testing_ Introduction to the Web and HTTP Protocol/02 - Intro to Web/02 - Labs/20 - Attacking HTTP Login Form with Hydra_lab.json 2.7 KB
4 - Web Application Penetration Testing/Web Application Penetration Testing_ Introduction to the Web and HTTP Protocol/02 - Intro to Web/02 - Labs/24 - Attacking HTTP Login Form with ZAProxy_lab.json 2.7 KB
4 - Web Application Penetration Testing/Web Application Penetration Testing_ Introduction to the Web and HTTP Protocol/01 - Welcome/01 - Introduction/01 - vod-4380-web-app-pen-testing-web-http-001.srt 2.4 KB
4 - Web Application Penetration Testing/Web Application Penetration Testing_ Introduction to the Web and HTTP Protocol/02 - Intro to Web/01 - Intro to Web/02 - vod-4380-web-app-pen-testing-web-http-002_quiz_solved.txt 1.8 KB
4 - Web Application Penetration Testing/Web Application Penetration Testing_ Introduction to the Web and HTTP Protocol/02 - Intro to Web/01 - Intro to Web/02 - vod-4380-web-app-pen-testing-web-http-002_quiz_notsolved.txt 1.7 KB
3 - Host & Network Penetration Testing/Host & Network Penetration Testing_ System_Host Based Attacks/03 - Windows/02 - Exploiting Windows Vulnerabilities/03 - Windows_ IIS Server DAVTest_lab.html 1.7 KB
3 - Host & Network Penetration Testing/Host & Network Penetration Testing_ Post-Exploitation/05 - Transferring Files/01 - Transferring Files To Windows & Linux Targets/03 - Setting Up A Web Server With Python_lab.html 1.6 KB
4 - Web Application Penetration Testing/Web Application Penetration Testing_ Introduction to the Web and HTTP Protocol/03 - Goodbye/01 - Conclusion/01 - vod-4380-web-app-pen-testing-web-http-015.srt 1.5 KB
4 - Web Application Penetration Testing/Web Application Penetration Testing_ Introduction to the Web and HTTP Protocol/02 - Intro to Web/02 - Labs/02 - HTTP Method Enumeration_lab.html 1.2 KB
3 - Host & Network Penetration Testing/Host & Network Penetration Testing_ The Metasploit Framework (MSF)/06 - Exploitation/05 - Linux Post Exploitation/06 - Privilege Escalation - Rootkit Scanner_lab.html 1.2 KB
4 - Web Application Penetration Testing/Web Application Penetration Testing_ Introduction to the Web and HTTP Protocol/02 - Intro to Web/02 - Labs/22 - Attacking Basic Auth with Burp Suite_lab.html 1.2 KB
4 - Web Application Penetration Testing/Web Application Penetration Testing_ Introduction to the Web and HTTP Protocol/02 - Intro to Web/02 - Labs/06 - Directory Enumeration with Burp Suite_lab.html 1.1 KB
3 - Host & Network Penetration Testing/Host & Network Penetration Testing_ The Metasploit Framework (MSF)/06 - Exploitation/04 - Windows Post Exploitation/09 - Privilege Escalation_ Impersonate_lab.html 1.1 KB
4 - Web Application Penetration Testing/Web Application Penetration Testing_ Introduction to the Web and HTTP Protocol/02 - Intro to Web/02 - Labs/04 - Directory Enumeration with Gobuster_lab.html 1.1 KB
4 - Web Application Penetration Testing/Web Application Penetration Testing_ Introduction to the Web and HTTP Protocol/02 - Intro to Web/02 - Labs/12 - Passive Crawling with Burp Suite_lab.html 1.0 KB
4 - Web Application Penetration Testing/Web Application Penetration Testing_ Introduction to the Web and HTTP Protocol/02 - Intro to Web/02 - Labs/18 - Authenticated XSS Attack with XSSer_lab.html 1.0 KB
3 - Host & Network Penetration Testing/Host & Network Penetration Testing_ The Metasploit Framework (MSF)/06 - Exploitation/01 - Windows Exploitation/11 - Windows_ Java Web Server_lab.html 1.0 KB
4 - Web Application Penetration Testing/Web Application Penetration Testing_ Introduction to the Web and HTTP Protocol/02 - Intro to Web/02 - Labs/16 - XSS Attack with XSSer_lab.html 1.0 KB
4 - Web Application Penetration Testing/Web Application Penetration Testing_ Introduction to the Web and HTTP Protocol/02 - Intro to Web/02 - Labs/14 - SQL Injection with SQLMap_lab.html 1010 bytes
4 - Web Application Penetration Testing/Web Application Penetration Testing_ Introduction to the Web and HTTP Protocol/02 - Intro to Web/02 - Labs/08 - Scanning Web Application with ZAProxy_lab.html 994 bytes
4 - Web Application Penetration Testing/Web Application Penetration Testing_ Introduction to the Web and HTTP Protocol/02 - Intro to Web/02 - Labs/10 - Scanning Web Application with Nikto_lab.html 990 bytes
4 - Web Application Penetration Testing/Web Application Penetration Testing_ Introduction to the Web and HTTP Protocol/02 - Intro to Web/02 - Labs/20 - Attacking HTTP Login Form with Hydra_lab.html 936 bytes
4 - Web Application Penetration Testing/Web Application Penetration Testing_ Introduction to the Web and HTTP Protocol/02 - Intro to Web/02 - Labs/24 - Attacking HTTP Login Form with ZAProxy_lab.html 920 bytes
If the content above is not authorized, please contact us via activebusinesscommunication[AT]gmail.com. Remember to include the full url in your complaint.