01.01-course overview.mp4
04:50
02.01-downloading iso and ova file for virtualbox.mp4
08:06
02.02-create a virtual install of kali using virtualbox.mp4
12:12
02.03-create a virtual install of metasploitable2.mp4
10:03
02.04-creating windows 7 pro target machine using virtualbox.mp4
07:22
02.05-installing the virtualbox extension pack.mp4
02:21
03.01-installing the webmap-nmap dashboard.mp4
11:57
03.02-automated reconenumeration using nmapautomator.mp4
10:25
04.01-create a reverse shell using command injection.mp4
06:34
04.02-create a reverse shell using a file upload.mp4
08:48
04.03-launch an automated meterpreter session.mp4
12:55
04.04-upgrade a dumb terminal to fully functional bash shell.mp4
09:51
04.05-windows 7 privilege escalation using uac bypass.mp4
05:12
04.06-creating a persistent backdoor using a persistent service.mp4
14:11
05.01-create virtual install of server 2016 full gui using virtualbox.mp4
12:17
05.02-preparing your server 2016 target.mp4
11:39
05.03-promote server 2016 to a domain controller.mp4
09:15
05.04-installing powershell empire on kali linux.mp4
05:08
05.05-enumerating active directory.mp4
15:33
05.06-post-exploitation of windows using powershell empire.mp4
19:36
06.01-advanced password hacking with metasploit.mp4
13:28
06.02-post-exploitation of microsoft windows.mp4
13:46
06.03-brute force the smb password on a windows server.mp4
10:01
06.04-enumerating active directory using rpcclient.mp4
16:07
06.05-dumping wi-fi credentials using netsh.mp4
04:32
07.01-heartbleed openssl exploit vulnerability.mp4
17:54
07.02-performing an rdp brute force attack.mp4
13:56
07.03-exploiting active directory using llmnrnbt-ns poisoning.mp4
11:34
07.04-accessing kali across the wan with ngrok.mp4
14:57
07.05-pentesting with netcat.mp4
12:49
07.06-enumerate dns records using dnsrecon.mp4
12:44
08.01-installing a wireless adapter in kali.mp4
09:09
08.02-j hacking a wireless network using kali linux.mp4
14:16
08.03-wireless deauthentication attack.mp4
06:47
08.04-pmkid client-less wireless attack using bettercap.mp4
10:19
09.01-overview of wireshark 3.2.mp4
10:40
09.02-wireshark capture options.mp4
07:23
09.03-wireshark toolbar icons.mp4
03:35
09.04-capturing wireless traffic using wireshark.mp4
05:09
09.05-capturing a 3-way tcp handshake using wireshark.mp4
04:56
10.01-creating a virtual install of owasp.mp4
05:50
10.02-setting up burp suite.mp4
08:58
10.03-attack web apps with burp suite using sql injection.mp4
11:48
10.04-os command injection using commix 3.2x.mp4
15:58
10.05-web application firewall detection using wafw00f.mp4
04:47
10.06-exploit vulnerable web applications using command injection.mp4
09:22
10.07-using banner grabbing to aid in reconnaissance.mp4
10:00
11.01-anonymize kali using whonix.mp4
10:12
12.01-lab preparation for ctf sql injection to shell.mp4
04:36
12.02-ctf walkthrough for sql injection to shell.mp4
13:18
9781803246390 Code.zip