Security+ 701 - Hands-On Cybersecurity Lab Series
File List
- Module 6 Custom Labs Practice Scenarios/002. Red Team Capstone Advanced Execution and Reporting.mp4 578.3 MB
- Module 6 Custom Labs Practice Scenarios/005. Blue Team Capstone Log Analysis and Detection.mp4 509.2 MB
- Module 6 Custom Labs Practice Scenarios/004. Walmart Attack Incident Response Tabletop Exercise.mp4 372.5 MB
- Module 6 Custom Labs Practice Scenarios/001. Red Team Capstone Planning, Executing, and Reporting.mp4 272.8 MB
- Module 6 Custom Labs Practice Scenarios/003. Red Team Capstone Final Analysis and Lessons Learned.mp4 241.2 MB
- Module 3 Web Exploitation and Shell Access/012. Wireshark Part 3.mp4 151.3 MB
- Module 3 Web Exploitation and Shell Access/011. Wireshark Part 2.mp4 133.9 MB
- Module 6 Custom Labs Practice Scenarios/006. Scripting Capstone YARA Rule Engineering.mp4 117.6 MB
- Module 5 Privilege Escalation, OWASP, and Scripting/026. Token Impersonation with Rogue Potato on Windows.mp4 114.0 MB
- Module 3 Web Exploitation and Shell Access/015. OWASP ZAP.mp4 105.9 MB
- Module 3 Web Exploitation and Shell Access/004. Linux Advanced Operations.mp4 103.0 MB
- Module 2 Network Scanning, Recon, and Vulnerabilities/024. VULNERS-NMAP.mp4 101.2 MB
- Module 5 Privilege Escalation, OWASP, and Scripting/024. LINPEAS for Privilege Escalation on Linux.mp4 100.1 MB
- Module 5 Privilege Escalation, OWASP, and Scripting/039. Basic Reverse Engineering Part 2.mp4 99.6 MB
- Module 3 Web Exploitation and Shell Access/014. TCPDump Part 2.mp4 99.0 MB
- Module 1 Information Gathering & Basic Tools/019. NMAP - Part 3.mp4 98.8 MB
- Module 4 Shells, Scripting, and Metasploit/008. John the Ripper Advanced Hashes.mp4 96.4 MB
- Module 3 Web Exploitation and Shell Access/020. SN1PER.mp4 96.2 MB
- Module 5 Privilege Escalation, OWASP, and Scripting/023. WINPEAS for Privilege Escalation on Windows.mp4 95.2 MB
- Module 3 Web Exploitation and Shell Access/007. Nikto for SSL TLS Misconfigurations.mp4 92.5 MB
- Module 1 Information Gathering & Basic Tools/011. CURL Part-1.mp4 90.5 MB
- Module 3 Web Exploitation and Shell Access/013. TCPDump Part 1.mp4 89.0 MB
- Module 4 Shells, Scripting, and Metasploit/002. Advanced File Operations Part 2.mp4 84.8 MB
- Module 4 Shells, Scripting, and Metasploit/007. John the Ripper Basic Hashes.mp4 83.1 MB
- Module 3 Web Exploitation and Shell Access/019. Exploring OWASP Top 10.mp4 83.0 MB
- Module 2 Network Scanning, Recon, and Vulnerabilities/016. Burp Suite Intruder.mp4 82.8 MB
- Module 4 Shells, Scripting, and Metasploit/021. Advanced Meterpreter Commands.mp4 80.2 MB
- Module 1 Information Gathering & Basic Tools/021. The Harverster.mp4 79.4 MB
- Module 5 Privilege Escalation, OWASP, and Scripting/012. Introduction to Python Scripting Part 3.mp4 79.1 MB
- Module 1 Information Gathering & Basic Tools/014. SSH - Part 2.mp4 77.9 MB
- Module 3 Web Exploitation and Shell Access/009. Getting a Shell Through a File Upload.mp4 77.3 MB
- Module 1 Information Gathering & Basic Tools/023. Banner Grabbing with Telnet and Netcat.mp4 73.2 MB
- Module 2 Network Scanning, Recon, and Vulnerabilities/014. Gobuster.mp4 71.9 MB
- Module 1 Information Gathering & Basic Tools/022. GOOGLE DORKING.mp4 71.5 MB
- Module 5 Privilege Escalation, OWASP, and Scripting/020. Establishing a Meterpreter Shell on Windows Using SET.mp4 71.3 MB
- Module 5 Privilege Escalation, OWASP, and Scripting/002. Advanced Bash Script Part 2.mp4 70.7 MB
- Module 4 Shells, Scripting, and Metasploit/009. More Advanced Uses of John the Ripper.mp4 70.6 MB
- Module 3 Web Exploitation and Shell Access/005. Sysinternals Process Explorer.mp4 70.5 MB
- Module 2 Network Scanning, Recon, and Vulnerabilities/007. Using DNSENUM.mp4 69.7 MB
- Module 2 Network Scanning, Recon, and Vulnerabilities/018. AUTO-SQLInjection-SQLMAP.mp4 68.9 MB
- Module 2 Network Scanning, Recon, and Vulnerabilities/012. Using wpscan.mp4 68.6 MB
- Module 4 Shells, Scripting, and Metasploit/018. Reverse Shell Using MSFVenom.mp4 68.1 MB
- Module 5 Privilege Escalation, OWASP, and Scripting/004. Introduction to PowerShell Scripting Part 1.mp4 67.8 MB
- Module 5 Privilege Escalation, OWASP, and Scripting/009. Advanced PowerShell Script Part 3.mp4 67.3 MB
- Module 3 Web Exploitation and Shell Access/006. Checksum for Files in Windows.mp4 66.8 MB
- Module 2 Network Scanning, Recon, and Vulnerabilities/025. NIKTO.mp4 66.5 MB
- Module 3 Web Exploitation and Shell Access/023. Aircrack-ng Suite Part 1.mp4 65.9 MB
- Module 1 Information Gathering & Basic Tools/015. HPING3.mp4 65.8 MB
- Module 5 Privilege Escalation, OWASP, and Scripting/017. More Advanced Python Scripting Part 3.mp4 65.7 MB
- Module 3 Web Exploitation and Shell Access/002. Linux Fundamentals Part 2.mp4 65.6 MB
- Module 5 Privilege Escalation, OWASP, and Scripting/035. A8 Insecure Deserialized Objects OWASP Top 10.mp4 64.9 MB
- Module 1 Information Gathering & Basic Tools/008. Kali Linux Setup Part-3.mp4 64.7 MB
- Module 2 Network Scanning, Recon, and Vulnerabilities/005. IP-SCANNERS.mp4 63.9 MB
- Module 4 Shells, Scripting, and Metasploit/016. MSFVENOM.mp4 63.6 MB
- Module 4 Shells, Scripting, and Metasploit/023. Exploiting a Vulnerable FTP Service to Gain Shell Access.mp4 63.2 MB
- Module 1 Information Gathering & Basic Tools/024. SHODAN.IO.mp4 63.1 MB
- Module 2 Network Scanning, Recon, and Vulnerabilities/009. Using Hashcat.mp4 62.6 MB
- Module 2 Network Scanning, Recon, and Vulnerabilities/023. NESSUS-ESSENTIALS - PART 2.mp4 62.4 MB
- Module 5 Privilege Escalation, OWASP, and Scripting/008. Advanced PowerShell Script Part 2.mp4 62.1 MB
- Module 1 Information Gathering & Basic Tools/004. PING - Part2.mp4 61.8 MB
- Module 3 Web Exploitation and Shell Access/024. Aircrack-ng Suite Part 2.mp4 61.7 MB
- Module 4 Shells, Scripting, and Metasploit/020. Basic Meterpreter Commands.mp4 61.1 MB
- Module 3 Web Exploitation and Shell Access/017. Responder.mp4 60.9 MB
- Module 5 Privilege Escalation, OWASP, and Scripting/014. Introduction to Python Scripting Part 5.mp4 60.6 MB
- Module 1 Information Gathering & Basic Tools/002. IFCONFIG - IPADDR SHOW.mp4 60.6 MB
- Module 1 Information Gathering & Basic Tools/028. CREDENTIAL HARVESTING USING SITE CLONING.mp4 60.4 MB
- Module 2 Network Scanning, Recon, and Vulnerabilities/019. DIRECTORY-TRAVERSAL.mp4 59.7 MB
- Module 5 Privilege Escalation, OWASP, and Scripting/013. Introduction to Python Scripting Part 4.mp4 59.1 MB
- Module 1 Information Gathering & Basic Tools/020. RECON-NG.mp4 58.8 MB
- Module 3 Web Exploitation and Shell Access/016. BeEF Browser Exploitation Framework.mp4 58.6 MB
- Module 4 Shells, Scripting, and Metasploit/004. Introduction to Bash Scripting Part 2.mp4 58.5 MB
- Module 1 Information Gathering & Basic Tools/018. NMAP - Part 2.mp4 58.3 MB
- Module 5 Privilege Escalation, OWASP, and Scripting/011. Introduction to Python Scripting Part 2.mp4 57.4 MB
- Module 3 Web Exploitation and Shell Access/001. Linux Fundamentals Part 1.mp4 57.2 MB
- Module 5 Privilege Escalation, OWASP, and Scripting/030. A3 Sensitive Information Disclosure OWASP Top 10.mp4 57.2 MB
- Module 2 Network Scanning, Recon, and Vulnerabilities/020. Broken Access Control.mp4 56.6 MB
- Module 1 Information Gathering & Basic Tools/029. DICTIONARY ATTACK USING HYDRA.mp4 56.5 MB
- Module 2 Network Scanning, Recon, and Vulnerabilities/010. Using fuzzing.mp4 56.3 MB
- Module 1 Information Gathering & Basic Tools/001. IPCONFIG.mp4 55.6 MB
- Module 5 Privilege Escalation, OWASP, and Scripting/006. Introduction to PowerShell Scripting Part 3.mp4 55.0 MB
- Module 3 Web Exploitation and Shell Access/003. Linux Files Operations.mp4 54.7 MB
- Module 2 Network Scanning, Recon, and Vulnerabilities/017. Manual SQL Injection.mp4 54.5 MB
- Module 1 Information Gathering & Basic Tools/030. EVIL TWIN ATTACK WITH AIRGEDDON.mp4 54.4 MB
- Module 5 Privilege Escalation, OWASP, and Scripting/025. SUID Privilege Escalation on Linux.mp4 54.4 MB
- Module 4 Shells, Scripting, and Metasploit/017. Creating Metasploit Payloads with MSFVenom.mp4 53.9 MB
- Module 3 Web Exploitation and Shell Access/018. Detecting Backdoors with Netcat.mp4 53.7 MB
- Module 2 Network Scanning, Recon, and Vulnerabilities/001. Using Netstat.mp4 53.5 MB
- Module 3 Web Exploitation and Shell Access/010. Wireshark Part 1.mp4 53.3 MB
- Module 1 Information Gathering & Basic Tools/010. DIG.mp4 52.8 MB
- Module 4 Shells, Scripting, and Metasploit/012. Stabilizing a Netcat Shell.mp4 52.7 MB
- Module 1 Information Gathering & Basic Tools/026. BURPSUITE - PART 2.mp4 52.4 MB
- Module 4 Shells, Scripting, and Metasploit/022. Upgrading a Limited Shell to a Meterpreter Shell.mp4 52.3 MB
- Module 5 Privilege Escalation, OWASP, and Scripting/031. A4 XML External Entity Injection OWASP Top 10.mp4 51.6 MB
- Module 4 Shells, Scripting, and Metasploit/025. Exploiting EternalBlue Vulnerability with Metasploit Part 2.mp4 51.4 MB
- Module 4 Shells, Scripting, and Metasploit/003. Introduction to Bash Scripting Part 1.mp4 51.2 MB
- Module 3 Web Exploitation and Shell Access/021. Kismet.mp4 50.5 MB
- Module 1 Information Gathering & Basic Tools/017. NMAP - Part 1.mp4 49.9 MB
- Module 2 Network Scanning, Recon, and Vulnerabilities/004. Using Route.mp4 49.7 MB
- Module 2 Network Scanning, Recon, and Vulnerabilities/006. Scanless.mp4 49.4 MB
- Module 5 Privilege Escalation, OWASP, and Scripting/016. More Advanced Python Scripting Part 2.mp4 49.1 MB
- Module 2 Network Scanning, Recon, and Vulnerabilities/003. Using ARP.mp4 48.9 MB
- Module 4 Shells, Scripting, and Metasploit/024. Exploiting EternalBlue Vulnerability with Metasploit Part 1.mp4 48.9 MB
- Module 5 Privilege Escalation, OWASP, and Scripting/019. Establishing a Session with Python Scripting Part 2.mp4 48.7 MB
- Module 5 Privilege Escalation, OWASP, and Scripting/018. Establishing a Session with Python Scripting Part 1.mp4 48.3 MB
- Module 2 Network Scanning, Recon, and Vulnerabilities/011. Macchanger.mp4 48.0 MB
- Module 2 Network Scanning, Recon, and Vulnerabilities/022. NESSUS-ESSENTIALS - PART 1.mp4 47.7 MB
- Module 1 Information Gathering & Basic Tools/027. CROSS SITE SCRIPTING (XSS).mp4 47.5 MB
- Module 5 Privilege Escalation, OWASP, and Scripting/015. More Advanced Python Scripting Part 1.mp4 47.4 MB
- Module 4 Shells, Scripting, and Metasploit/019. Bind Shell Using MSFVenom.mp4 47.4 MB
- Module 1 Information Gathering & Basic Tools/025. BURPSUITE - PART 1.mp4 47.4 MB
- Module 1 Information Gathering & Basic Tools/031. DNS-ZONE- TRANSFER.mp4 47.3 MB
- Module 5 Privilege Escalation, OWASP, and Scripting/007. Advanced PowerShell Script Part 1.mp4 46.9 MB
- Module 5 Privilege Escalation, OWASP, and Scripting/022. Using Mimikatz to Extract Passwords from Windows.mp4 46.8 MB
- Module 2 Network Scanning, Recon, and Vulnerabilities/002. Netcat.mp4 46.7 MB
- Module 4 Shells, Scripting, and Metasploit/026. Scheduled Task Persistence Detect and Remediate.mp4 46.4 MB
- Module 2 Network Scanning, Recon, and Vulnerabilities/021. Masscan for High-Speed Scanning.mp4 46.1 MB
- Module 1 Information Gathering & Basic Tools/016. PUTTY.mp4 46.0 MB
- Module 5 Privilege Escalation, OWASP, and Scripting/027. Basic Python Keylogger.mp4 45.2 MB
- Module 1 Information Gathering & Basic Tools/006. Kali Linux Setup Part-1.mp4 44.4 MB
- Module 4 Shells, Scripting, and Metasploit/005. Introduction to Bash Scripting Part 3.mp4 44.2 MB
- Module 5 Privilege Escalation, OWASP, and Scripting/028. A1 Command Injection OWASP Top 10.mp4 44.0 MB
- Module 5 Privilege Escalation, OWASP, and Scripting/032. A5 Broken Access Control OWASP Top 10.mp4 44.0 MB
- Module 4 Shells, Scripting, and Metasploit/006. More Bash Scripting.mp4 43.7 MB
- Module 4 Shells, Scripting, and Metasploit/010. Establishing a Reverse Shell with Netcat.mp4 43.5 MB
- Module 1 Information Gathering & Basic Tools/005. TRACERT OR TRACEROUTE.mp4 43.1 MB
- Module 2 Network Scanning, Recon, and Vulnerabilities/015. CSRF.mp4 41.9 MB
- Module 1 Information Gathering & Basic Tools/003. PING - Part1.mp4 41.7 MB
- Module 1 Information Gathering & Basic Tools/009. NSLOOKUP.mp4 41.3 MB
- Module 4 Shells, Scripting, and Metasploit/015. Stabilizing a Socat Shell.mp4 41.3 MB
- Module 1 Information Gathering & Basic Tools/013. SSH - Part 1.mp4 40.1 MB
- Module 5 Privilege Escalation, OWASP, and Scripting/005. Introduction to PowerShell Scripting Part 2.mp4 40.0 MB
- Module 4 Shells, Scripting, and Metasploit/001. Advanced File Operations Part 1.mp4 39.0 MB
- Module 5 Privilege Escalation, OWASP, and Scripting/038. Basic Reverse Engineering Part 1.mp4 38.7 MB
- Module 5 Privilege Escalation, OWASP, and Scripting/001. Advanced Bash Script Part 1.mp4 37.1 MB
- Module 5 Privilege Escalation, OWASP, and Scripting/029. A2 Broken Authentication OWASP Top 10.mp4 36.7 MB
- Module 3 Web Exploitation and Shell Access/008. File Inclusion Attacks.mp4 35.1 MB
- Course Introduction/002. What Will We Cover In this Course.mp4 32.1 MB
- Module 4 Shells, Scripting, and Metasploit/013. Reverse Shell with Socat.mp4 32.0 MB
- Module 2 Network Scanning, Recon, and Vulnerabilities/013. Reaver.mp4 31.1 MB
- Module 1 Information Gathering & Basic Tools/007. Kali Linux Setup Part-2.mp4 30.7 MB
- Module 2 Network Scanning, Recon, and Vulnerabilities/008. How to connect to an internal network using OpenVPN.mp4 30.2 MB
- Module 5 Privilege Escalation, OWASP, and Scripting/010. Introduction to Python Scripting Part 1.mp4 29.2 MB
- Module 5 Privilege Escalation, OWASP, and Scripting/033. A6 Security Misconfiguration OWASP Top 10.mp4 28.7 MB
- Module 4 Shells, Scripting, and Metasploit/014. Bind Shell with Socat.mp4 28.6 MB
- Module 5 Privilege Escalation, OWASP, and Scripting/034. A7 Cross Site Scripting OWASP Top 10.mp4 28.3 MB
- Module 5 Privilege Escalation, OWASP, and Scripting/036. A9 Components with Known Vulnerabilities OWASP Top 10.mp4 26.4 MB
- Module 5 Privilege Escalation, OWASP, and Scripting/021. Migration to a Different Process on the Target Machine.mp4 26.3 MB
- Module 3 Web Exploitation and Shell Access/022. Wifite.mp4 26.3 MB
- Module 4 Shells, Scripting, and Metasploit/011. Establishing a Bind Shell with Netcat.mp4 23.9 MB
- Module 1 Information Gathering & Basic Tools/012. CURL Part-2.mp4 19.9 MB
- Module 5 Privilege Escalation, OWASP, and Scripting/003. Advanced Bash Script Part 3.mp4 18.8 MB
- Module 5 Privilege Escalation, OWASP, and Scripting/037. A10 Unvalidated Redirects and Forwards OWASP Top 10.mp4 17.9 MB
- Course Introduction/001. Course Trailer.mp4 16.5 MB
- z.Security-701---Hands-On-Cybersecurity-Lab-Series-main/Module-6/4. Walmart Attack - Incident response report summary.pdf 171.4 KB
- Module 6 Custom Labs Practice Scenarios/002. Red Team Capstone Advanced Execution and Reporting.en.srt 129.0 KB
- Module 6 Custom Labs Practice Scenarios/004. Walmart Attack Incident Response Tabletop Exercise.en.srt 94.1 KB
- Module 6 Custom Labs Practice Scenarios/001. Red Team Capstone Planning, Executing, and Reporting.en.srt 79.1 KB
- Module 6 Custom Labs Practice Scenarios/005. Blue Team Capstone Log Analysis and Detection.en.srt 78.1 KB
- Module 6 Custom Labs Practice Scenarios/003. Red Team Capstone Final Analysis and Lessons Learned.en.srt 71.3 KB
- Module 6 Custom Labs Practice Scenarios/006. Scripting Capstone YARA Rule Engineering.en.srt 42.9 KB
- Module 5 Privilege Escalation, OWASP, and Scripting/026. Token Impersonation with Rogue Potato on Windows.en.srt 34.3 KB
- Module 5 Privilege Escalation, OWASP, and Scripting/012. Introduction to Python Scripting Part 3.en.srt 31.6 KB
- Module 5 Privilege Escalation, OWASP, and Scripting/039. Basic Reverse Engineering Part 2.en.srt 28.6 KB
- Module 5 Privilege Escalation, OWASP, and Scripting/014. Introduction to Python Scripting Part 5.en.srt 27.9 KB
- Module 1 Information Gathering & Basic Tools/014. SSH - Part 2.en.srt 24.5 KB
- Module 3 Web Exploitation and Shell Access/013. TCPDump Part 1.en.srt 24.5 KB
- Module 3 Web Exploitation and Shell Access/012. Wireshark Part 3.en.srt 24.3 KB
- Module 5 Privilege Escalation, OWASP, and Scripting/002. Advanced Bash Script Part 2.en.srt 24.3 KB
- Module 5 Privilege Escalation, OWASP, and Scripting/011. Introduction to Python Scripting Part 2.en.srt 24.2 KB
- Module 5 Privilege Escalation, OWASP, and Scripting/006. Introduction to PowerShell Scripting Part 3.en.srt 24.1 KB
- Module 4 Shells, Scripting, and Metasploit/018. Reverse Shell Using MSFVenom.en.srt 23.7 KB
- Module 5 Privilege Escalation, OWASP, and Scripting/013. Introduction to Python Scripting Part 4.en.srt 23.5 KB
- Module 3 Web Exploitation and Shell Access/002. Linux Fundamentals Part 2.en.srt 23.4 KB
- z.Security-701---Hands-On-Cybersecurity-Lab-Series-main/Module-6/PCAP-FILES for BLUE TEAM CAPSTONE/CHALLENGE/MITM-CHALLENGE-QUESTIONS.docx 23.2 KB
- Module 3 Web Exploitation and Shell Access/024. Aircrack-ng Suite Part 2.en.srt 23.2 KB
- Module 4 Shells, Scripting, and Metasploit/026. Scheduled Task Persistence Detect and Remediate.en.srt 22.8 KB
- Module 5 Privilege Escalation, OWASP, and Scripting/023. WINPEAS for Privilege Escalation on Windows.en.srt 22.6 KB
- Module 4 Shells, Scripting, and Metasploit/002. Advanced File Operations Part 2.en.srt 22.5 KB
- Module 5 Privilege Escalation, OWASP, and Scripting/008. Advanced PowerShell Script Part 2.en.srt 22.4 KB
- Module 3 Web Exploitation and Shell Access/004. Linux Advanced Operations.en.srt 22.3 KB
- Module 4 Shells, Scripting, and Metasploit/004. Introduction to Bash Scripting Part 2.en.srt 22.2 KB
- Module 3 Web Exploitation and Shell Access/006. Checksum for Files in Windows.en.srt 22.1 KB
- Module 4 Shells, Scripting, and Metasploit/007. John the Ripper Basic Hashes.en.srt 21.9 KB
- Module 4 Shells, Scripting, and Metasploit/008. John the Ripper Advanced Hashes.en.srt 21.7 KB
- Module 5 Privilege Escalation, OWASP, and Scripting/017. More Advanced Python Scripting Part 3.en.srt 21.6 KB
- Module 3 Web Exploitation and Shell Access/015. OWASP ZAP.en.srt 21.6 KB
- Module 3 Web Exploitation and Shell Access/011. Wireshark Part 2.en.srt 21.4 KB
- Module 4 Shells, Scripting, and Metasploit/021. Advanced Meterpreter Commands.en.srt 21.2 KB
- Module 5 Privilege Escalation, OWASP, and Scripting/009. Advanced PowerShell Script Part 3.en.srt 21.2 KB
- Module 4 Shells, Scripting, and Metasploit/016. MSFVENOM.en.srt 21.1 KB
- Module 5 Privilege Escalation, OWASP, and Scripting/007. Advanced PowerShell Script Part 1.en.srt 21.1 KB
- Module 2 Network Scanning, Recon, and Vulnerabilities/016. Burp Suite Intruder.en.srt 21.0 KB
- Module 2 Network Scanning, Recon, and Vulnerabilities/023. NESSUS-ESSENTIALS - PART 2.en.srt 21.0 KB
- Module 3 Web Exploitation and Shell Access/003. Linux Files Operations.en.srt 20.9 KB
- Module 4 Shells, Scripting, and Metasploit/005. Introduction to Bash Scripting Part 3.en.srt 20.8 KB
- Module 1 Information Gathering & Basic Tools/002. IFCONFIG - IPADDR SHOW.en.srt 20.6 KB
- Module 5 Privilege Escalation, OWASP, and Scripting/015. More Advanced Python Scripting Part 1.en.srt 20.5 KB
- Module 5 Privilege Escalation, OWASP, and Scripting/020. Establishing a Meterpreter Shell on Windows Using SET.en.srt 20.5 KB
- Module 3 Web Exploitation and Shell Access/021. Kismet.en.srt 20.4 KB
- Module 1 Information Gathering & Basic Tools/001. IPCONFIG.en.srt 20.3 KB
- Module 3 Web Exploitation and Shell Access/001. Linux Fundamentals Part 1.en.srt 20.3 KB
- Module 5 Privilege Escalation, OWASP, and Scripting/004. Introduction to PowerShell Scripting Part 1.en.srt 20.2 KB
- Module 5 Privilege Escalation, OWASP, and Scripting/024. LINPEAS for Privilege Escalation on Linux.en.srt 20.1 KB
- Module 5 Privilege Escalation, OWASP, and Scripting/018. Establishing a Session with Python Scripting Part 1.en.srt 20.1 KB
- Module 2 Network Scanning, Recon, and Vulnerabilities/024. VULNERS-NMAP.en.srt 19.9 KB
- Module 5 Privilege Escalation, OWASP, and Scripting/027. Basic Python Keylogger.en.srt 19.9 KB
- Module 5 Privilege Escalation, OWASP, and Scripting/005. Introduction to PowerShell Scripting Part 2.en.srt 19.8 KB
- Module 3 Web Exploitation and Shell Access/010. Wireshark Part 1.en.srt 19.7 KB
- Module 3 Web Exploitation and Shell Access/009. Getting a Shell Through a File Upload.en.srt 19.7 KB
- Module 5 Privilege Escalation, OWASP, and Scripting/016. More Advanced Python Scripting Part 2.en.srt 19.6 KB
- Module 3 Web Exploitation and Shell Access/016. BeEF Browser Exploitation Framework.en.srt 19.6 KB
- Module 4 Shells, Scripting, and Metasploit/006. More Bash Scripting.en.srt 19.4 KB
- Module 1 Information Gathering & Basic Tools/030. EVIL TWIN ATTACK WITH AIRGEDDON.en.srt 19.3 KB
- Module 3 Web Exploitation and Shell Access/023. Aircrack-ng Suite Part 1.en.srt 19.2 KB
- Module 3 Web Exploitation and Shell Access/019. Exploring OWASP Top 10.en.srt 19.2 KB
- Module 3 Web Exploitation and Shell Access/017. Responder.en.srt 19.0 KB
- Module 3 Web Exploitation and Shell Access/007. Nikto for SSL TLS Misconfigurations.en.srt 18.9 KB
- Module 5 Privilege Escalation, OWASP, and Scripting/035. A8 Insecure Deserialized Objects OWASP Top 10.en.srt 18.9 KB
- Module 2 Network Scanning, Recon, and Vulnerabilities/001. Using Netstat.en.srt 18.8 KB
- Module 1 Information Gathering & Basic Tools/025. BURPSUITE - PART 1.en.srt 18.7 KB
- Module 5 Privilege Escalation, OWASP, and Scripting/019. Establishing a Session with Python Scripting Part 2.en.srt 18.6 KB
- Module 1 Information Gathering & Basic Tools/029. DICTIONARY ATTACK USING HYDRA.en.srt 18.5 KB
- Module 2 Network Scanning, Recon, and Vulnerabilities/014. Gobuster.en.srt 18.4 KB
- Module 2 Network Scanning, Recon, and Vulnerabilities/009. Using Hashcat.en.srt 18.4 KB
- Module 4 Shells, Scripting, and Metasploit/020. Basic Meterpreter Commands.en.srt 18.4 KB
- Module 3 Web Exploitation and Shell Access/020. SN1PER.en.srt 18.2 KB
- Module 2 Network Scanning, Recon, and Vulnerabilities/017. Manual SQL Injection.en.srt 18.1 KB
- Module 4 Shells, Scripting, and Metasploit/012. Stabilizing a Netcat Shell.en.srt 17.9 KB
- Module 3 Web Exploitation and Shell Access/014. TCPDump Part 2.en.srt 17.8 KB
- Module 4 Shells, Scripting, and Metasploit/003. Introduction to Bash Scripting Part 1.en.srt 17.7 KB
- Module 2 Network Scanning, Recon, and Vulnerabilities/018. AUTO-SQLInjection-SQLMAP.en.srt 17.7 KB
- Module 1 Information Gathering & Basic Tools/027. CROSS SITE SCRIPTING (XSS).en.srt 17.6 KB
- Module 2 Network Scanning, Recon, and Vulnerabilities/020. Broken Access Control.en.srt 17.6 KB
- Module 2 Network Scanning, Recon, and Vulnerabilities/003. Using ARP.en.srt 17.6 KB
- Module 4 Shells, Scripting, and Metasploit/017. Creating Metasploit Payloads with MSFVenom.en.srt 17.6 KB
- Module 1 Information Gathering & Basic Tools/021. The Harverster.en.srt 17.6 KB
- Module 1 Information Gathering & Basic Tools/015. HPING3.en.srt 17.5 KB
- Module 5 Privilege Escalation, OWASP, and Scripting/001. Advanced Bash Script Part 1.en.srt 17.4 KB
- Module 2 Network Scanning, Recon, and Vulnerabilities/002. Netcat.en.srt 17.4 KB
- Module 1 Information Gathering & Basic Tools/024. SHODAN.IO.en.srt 17.3 KB
- Module 1 Information Gathering & Basic Tools/006. Kali Linux Setup Part-1.en.srt 17.2 KB
- Module 1 Information Gathering & Basic Tools/003. PING - Part1.en.srt 17.2 KB
- Module 5 Privilege Escalation, OWASP, and Scripting/025. SUID Privilege Escalation on Linux.en.srt 17.2 KB
- Module 1 Information Gathering & Basic Tools/009. NSLOOKUP.en.srt 17.1 KB
- Module 1 Information Gathering & Basic Tools/010. DIG.en.srt 17.1 KB
- Module 3 Web Exploitation and Shell Access/018. Detecting Backdoors with Netcat.en.srt 17.0 KB
- Module 1 Information Gathering & Basic Tools/023. Banner Grabbing with Telnet and Netcat.en.srt 16.9 KB
- Module 1 Information Gathering & Basic Tools/005. TRACERT OR TRACEROUTE.en.srt 16.8 KB
- Module 2 Network Scanning, Recon, and Vulnerabilities/005. IP-SCANNERS.en.srt 16.7 KB
- Module 1 Information Gathering & Basic Tools/028. CREDENTIAL HARVESTING USING SITE CLONING.en.srt 16.7 KB
- Module 3 Web Exploitation and Shell Access/005. Sysinternals Process Explorer.en.srt 16.6 KB
- Module 1 Information Gathering & Basic Tools/004. PING - Part2.en.srt 16.5 KB
- Module 1 Information Gathering & Basic Tools/008. Kali Linux Setup Part-3.en.srt 16.5 KB
- Module 2 Network Scanning, Recon, and Vulnerabilities/019. DIRECTORY-TRAVERSAL.en.srt 16.5 KB
- Module 4 Shells, Scripting, and Metasploit/024. Exploiting EternalBlue Vulnerability with Metasploit Part 1.en.srt 16.4 KB
- Module 2 Network Scanning, Recon, and Vulnerabilities/012. Using wpscan.en.srt 16.3 KB
- Module 2 Network Scanning, Recon, and Vulnerabilities/007. Using DNSENUM.en.srt 16.3 KB
- Module 4 Shells, Scripting, and Metasploit/019. Bind Shell Using MSFVenom.en.srt 16.3 KB
- Module 5 Privilege Escalation, OWASP, and Scripting/022. Using Mimikatz to Extract Passwords from Windows.en.srt 16.1 KB
- Module 2 Network Scanning, Recon, and Vulnerabilities/010. Using fuzzing.en.srt 16.1 KB
- Module 1 Information Gathering & Basic Tools/026. BURPSUITE - PART 2.en.srt 16.0 KB
- Module 4 Shells, Scripting, and Metasploit/023. Exploiting a Vulnerable FTP Service to Gain Shell Access.en.srt 15.9 KB
- Module 2 Network Scanning, Recon, and Vulnerabilities/004. Using Route.en.srt 15.9 KB
- Module 1 Information Gathering & Basic Tools/022. GOOGLE DORKING.en.srt 15.9 KB
- Module 2 Network Scanning, Recon, and Vulnerabilities/015. CSRF.en.srt 15.6 KB
- Module 5 Privilege Escalation, OWASP, and Scripting/010. Introduction to Python Scripting Part 1.en.srt 15.5 KB
- Module 1 Information Gathering & Basic Tools/020. RECON-NG.en.srt 15.3 KB
- Module 3 Web Exploitation and Shell Access/008. File Inclusion Attacks.en.srt 15.0 KB
- Module 2 Network Scanning, Recon, and Vulnerabilities/025. NIKTO.en.srt 15.0 KB
- Module 4 Shells, Scripting, and Metasploit/010. Establishing a Reverse Shell with Netcat.en.srt 15.0 KB
- Module 1 Information Gathering & Basic Tools/019. NMAP - Part 3.en.srt 15.0 KB
- Module 1 Information Gathering & Basic Tools/013. SSH - Part 1.en.srt 14.9 KB
- Module 4 Shells, Scripting, and Metasploit/009. More Advanced Uses of John the Ripper.en.srt 14.9 KB
- Module 1 Information Gathering & Basic Tools/017. NMAP - Part 1.en.srt 14.8 KB
- Module 4 Shells, Scripting, and Metasploit/001. Advanced File Operations Part 1.en.srt 14.6 KB
- Module 1 Information Gathering & Basic Tools/031. DNS-ZONE- TRANSFER.en.srt 14.5 KB
- Module 5 Privilege Escalation, OWASP, and Scripting/038. Basic Reverse Engineering Part 1.en.srt 14.5 KB
- Module 4 Shells, Scripting, and Metasploit/013. Reverse Shell with Socat.en.srt 14.4 KB
- Module 2 Network Scanning, Recon, and Vulnerabilities/021. Masscan for High-Speed Scanning.en.srt 14.1 KB
- Module 2 Network Scanning, Recon, and Vulnerabilities/011. Macchanger.en.srt 14.1 KB
- Module 2 Network Scanning, Recon, and Vulnerabilities/022. NESSUS-ESSENTIALS - PART 1.en.srt 14.0 KB
- Module 1 Information Gathering & Basic Tools/018. NMAP - Part 2.en.srt 14.0 KB
- Module 4 Shells, Scripting, and Metasploit/022. Upgrading a Limited Shell to a Meterpreter Shell.en.srt 13.9 KB
- Module 5 Privilege Escalation, OWASP, and Scripting/031. A4 XML External Entity Injection OWASP Top 10.en.srt 13.6 KB
- Module 1 Information Gathering & Basic Tools/011. CURL Part-1.en.srt 13.1 KB
- Module 2 Network Scanning, Recon, and Vulnerabilities/006. Scanless.en.srt 13.0 KB
- Module 5 Privilege Escalation, OWASP, and Scripting/030. A3 Sensitive Information Disclosure OWASP Top 10.en.srt 12.9 KB
- Module 4 Shells, Scripting, and Metasploit/025. Exploiting EternalBlue Vulnerability with Metasploit Part 2.en.srt 12.8 KB
- Module 5 Privilege Escalation, OWASP, and Scripting/028. A1 Command Injection OWASP Top 10.en.srt 12.7 KB
- Module 4 Shells, Scripting, and Metasploit/015. Stabilizing a Socat Shell.en.srt 12.2 KB
- Module 1 Information Gathering & Basic Tools/007. Kali Linux Setup Part-2.en.srt 11.8 KB
- Module 4 Shells, Scripting, and Metasploit/011. Establishing a Bind Shell with Netcat.en.srt 11.3 KB
- Module 5 Privilege Escalation, OWASP, and Scripting/029. A2 Broken Authentication OWASP Top 10.en.srt 11.2 KB
- Module 2 Network Scanning, Recon, and Vulnerabilities/008. How to connect to an internal network using OpenVPN.en.srt 11.0 KB
- Module 5 Privilege Escalation, OWASP, and Scripting/032. A5 Broken Access Control OWASP Top 10.en.srt 10.9 KB
- Module 2 Network Scanning, Recon, and Vulnerabilities/013. Reaver.en.srt 10.5 KB
- Module 5 Privilege Escalation, OWASP, and Scripting/033. A6 Security Misconfiguration OWASP Top 10.en.srt 10.2 KB
- Module 4 Shells, Scripting, and Metasploit/014. Bind Shell with Socat.en.srt 10.1 KB
- Module 3 Web Exploitation and Shell Access/022. Wifite.en.srt 9.9 KB
- Module 1 Information Gathering & Basic Tools/016. PUTTY.en.srt 9.7 KB
- Module 1 Information Gathering & Basic Tools/012. CURL Part-2.en.srt 9.5 KB
- Module 5 Privilege Escalation, OWASP, and Scripting/036. A9 Components with Known Vulnerabilities OWASP Top 10.en.srt 8.7 KB
- Module 5 Privilege Escalation, OWASP, and Scripting/021. Migration to a Different Process on the Target Machine.en.srt 8.6 KB
- Module 5 Privilege Escalation, OWASP, and Scripting/034. A7 Cross Site Scripting OWASP Top 10.en.srt 8.0 KB
- z.Security-701---Hands-On-Cybersecurity-Lab-Series-main/Module-1/DNS-Zone-Transfer-Lab-Handout.pdf 7.9 KB
- Module 5 Privilege Escalation, OWASP, and Scripting/037. A10 Unvalidated Redirects and Forwards OWASP Top 10.en.srt 6.8 KB
- Module 5 Privilege Escalation, OWASP, and Scripting/003. Advanced Bash Script Part 3.en.srt 6.3 KB
- Course Introduction/002. What Will We Cover In this Course.en.srt 4.5 KB
- z.Security-701---Hands-On-Cybersecurity-Lab-Series-main/Module-5/7-9_PowerShell Script_ System-Checker.ps1 3.2 KB
- z.Security-701---Hands-On-Cybersecurity-Lab-Series-main/Module-2/DNS-Record-Types i.md 2.4 KB
- z.Security-701---Hands-On-Cybersecurity-Lab-Series-main/Module-3/Sn1per-Modes.md 2.2 KB
- z.Security-701---Hands-On-Cybersecurity-Lab-Series-main/Module-5/15-17_Python Script_ Basic-Port-Scanner.py 2.0 KB
- z.Security-701---Hands-On-Cybersecurity-Lab-Series-main/Module-5/11-14_Introduction-To-Python.py 2.0 KB
- z.Security-701---Hands-On-Cybersecurity-Lab-Series-main/README.md 1.9 KB
- z.Security-701---Hands-On-Cybersecurity-Lab-Series-main/Module-5/18_Establishing-Session-Python_ SERVER.py 1.6 KB
- z.Security-701---Hands-On-Cybersecurity-Lab-Series-main/Module-5/1-3_Bash Script_ Tiny-Recon.sh 1.5 KB
- z.Security-701---Hands-On-Cybersecurity-Lab-Series-main/Module-5/19_Establishing-Session-Python_ CLIENT.py 1.2 KB
- z.Security-701---Hands-On-Cybersecurity-Lab-Series-main/LICENSE 1.0 KB
- z.Security-701---Hands-On-Cybersecurity-Lab-Series-main/Module-1/NMAP-Progressive-Scanning-Commands.md 692 bytes
- z.Security-701---Hands-On-Cybersecurity-Lab-Series-main/Module-6/PCAP-FILES for BLUE TEAM CAPSTONE/ANALYZED/Analyzed PCAP_S - FINDINGS.txt 638 bytes
- z.Security-701---Hands-On-Cybersecurity-Lab-Series-main/Module-2/Netstat-Utility-Useful-Tags.md 623 bytes
- z.Security-701---Hands-On-Cybersecurity-Lab-Series-main/Module-6/PCAP-FILES for BLUE TEAM CAPSTONE/ANALYZED/.gitattributes 273 bytes
- z.Security-701---Hands-On-Cybersecurity-Lab-Series-main/Module-6/PCAP-FILES for BLUE TEAM CAPSTONE/CHALLENGE/MITM-CHALLENGE.pcap 134 bytes
- z.Security-701---Hands-On-Cybersecurity-Lab-Series-main/Module-6/PCAP-FILES for BLUE TEAM CAPSTONE/ANALYZED/0800 - Analyzed ✅.pcap 131 bytes
- z.Security-701---Hands-On-Cybersecurity-Lab-Series-main/Module-6/PCAP-FILES for BLUE TEAM CAPSTONE/ANALYZED/1415 - Analyzed ✅.pcap 131 bytes
- z.Security-701---Hands-On-Cybersecurity-Lab-Series-main/Module-6/PCAP-FILES for BLUE TEAM CAPSTONE/ANALYZED/1130 - Analyzed ✅.pcap 130 bytes
- z.Security-701---Hands-On-Cybersecurity-Lab-Series-main/Module-1/theHarvester-Requirements.txt 121 bytes
- z.Security-701---Hands-On-Cybersecurity-Lab-Series-main/Module-6/PCAP-FILES for BLUE TEAM CAPSTONE/CHALLENGE/.gitattributes 56 bytes
- Course Introduction/001. Course Trailer.en.srt 48 bytes
- z.Security-701---Hands-On-Cybersecurity-Lab-Series-main/Module-5/27_Basic-Keylogger.py 0 bytes
Download Torrent
Related Resources
Copyright Infringement
If the content above is not authorized, please contact us via activebusinesscommunication[AT]gmail.com. Remember to include the full url in your complaint.