LA274/001 - About the Author.mp4 |
20.3 MB |
LA274/002 - About the Course.mp4 |
37.1 MB |
LA274/003 - Course Prerequisites.mp4 |
63 MB |
LA274/004 - Community and Support.mp4 |
46.8 MB |
LA274/005 - Disclaimer: It Is Not Like in the Movies!.mp4 |
53.7 MB |
LA274/006 - What Is What.mp4 |
135.7 MB |
LA274/007 - Where Is What.mp4 |
106.4 MB |
LA274/008 - Linux Command Line Review.mp4 |
114.1 MB |
LA274/009 - Services.mp4 |
100.2 MB |
LA274/010 - Firewalls.mp4 |
83.2 MB |
LA274/011 - Users.mp4 |
59.4 MB |
LA274/012 - Introduction.mp4 |
36.8 MB |
LA274/013 - Installing Kali Linux — Part 1.mp4 |
83.3 MB |
LA274/014 - Installing Kali Linux — Part 2.mp4 |
16.1 MB |
LA274/015 - Building a Custom Kali Linux Image.mp4 |
148.1 MB |
LA274/016 - Creating a Live USB.mp4 |
43.7 MB |
LA274/017 - Booting from a Live USB.mp4 |
33.9 MB |
LA274/018 - Adding Encrypted Persistent Storage.mp4 |
84.7 MB |
LA274/019 - Finalizing and Testing the Live USB.mp4 |
125.4 MB |
LA274/020 - What Is Social Engineering?.mp4 |
178.1 MB |
LA274/021 - Don't Be an Easy Target!.mp4 |
206.9 MB |
LA274/022 - Circles of Trust.mp4 |
94.4 MB |
LA274/023 - Keyloggers.mp4 |
97.5 MB |
LA274/024 - ATMs and Banks.mp4 |
61 MB |
LA274/025 - Physical Access to Devices.mp4 |
139.3 MB |
LA274/026 - Real Anonymity vs. Perceived Anonymity.mp4 |
133.9 MB |
LA274/027 - Common Pitfalls.mp4 |
143.1 MB |
LA274/028 - What Is a VPN?.mp4 |
95.2 MB |
LA274/029 - Setting Up a VPN: Server Side — Part 1.mp4 |
139.7 MB |
LA274/030 - Setting Up a VPN: Server Side — Part 2.mp4 |
161.9 MB |
LA274/031 - Setting Up a VPN: Server Side — Part 3.mp4 |
121.7 MB |
LA274/032 - Setting Up a VPN: Client Side.mp4 |
150.6 MB |
LA274/033 - Connecting to a VPN.mp4 |
60.4 MB |
LA274/034 - What Is Tor?.mp4 |
123.5 MB |
LA274/035 - Tor Browser.mp4 |
167.6 MB |
LA274/036 - The Tor Service.mp4 |
147 MB |
LA274/037 - What Is a Proxy?.mp4 |
55.8 MB |
LA274/038 - Setting Up a SOCKS5 Proxy.mp4 |
112.9 MB |
LA274/039 - Connecting to a Proxy.mp4 |
86.1 MB |
LA274/040 - Introduction to Phishing and Tracking.mp4 |
65.2 MB |
LA274/041 - Setting Up Email Tracking.mp4 |
106.3 MB |
LA274/042 - Let's Go Phishing!.mp4 |
126.3 MB |
LA274/043 - ARP Spoofing.mp4 |
196.8 MB |
LA274/044 - MAC Address Spoofing.mp4 |
83.1 MB |
LA274/045 - DHCP Starvation.mp4 |
110.2 MB |
LA274/046 - Google Dorks.mp4 |
91.4 MB |
LA274/047 - WHOIS and GeoIP Lookup.mp4 |
106.5 MB |
LA274/048 - Nmap.mp4 |
102.5 MB |
LA274/049 - Host Discovery.mp4 |
103.2 MB |
LA274/050 - Open Port Discovery.mp4 |
164.3 MB |
LA274/051 - Network Mapping.mp4 |
75.3 MB |
LA274/052 - Service and Service Version Detection.mp4 |
54.4 MB |
LA274/053 - Identifying the Operating System.mp4 |
47.6 MB |
LA274/054 - Vulnerability Scans.mp4 |
164.8 MB |
LA274/055 - What Are DoS and DDoS Attacks?.mp4 |
109.6 MB |
LA274/056 - Famous DDoS Attacks.mp4 |
82.6 MB |
LA274/057 - Scanning Networks, Capturing a Handshake, and Deauthenticating Clients.mp4 |
143.7 MB |
LA274/058 - Password Cracking: Math, Common Sense, and Limits.mp4 |
85.1 MB |
LA274/059 - Setting Up the Environment and Installing GPU Drivers.mp4 |
139.1 MB |
LA274/060 - Using Hashcat and Password Masks.mp4 |
174.3 MB |
LA274/061 - Hashcat Wrap-Up.mp4 |
45.4 MB |
LA274/062 - What Is Buffer Overflow?.mp4 |
119.3 MB |
LA274/063 - Using Buffer Overflow to Bypass Authentication.mp4 |
85.3 MB |
LA274/064 - What Is Reverse Engineering?.mp4 |
109.6 MB |
LA274/065 - Setting Up an IDE to Compile a Keylogger.mp4 |
69.1 MB |
LA274/066 - Getting, Importing, and Compiling the Source Code.mp4 |
65 MB |
LA274/067 - Compiling and Customizing the Source Code.mp4 |
106 MB |
LA274/068 - Testing Out the Keylogger.mp4 |
35.9 MB |
LA274/069 - Detecting Process Abnormalities in the Task Manager.mp4 |
180.2 MB |
LA274/070 - Analyzing Processes with Cheat Engine.mp4 |
172.3 MB |
LA274/071 - Determining What an Unknown Program Is Doing — Part 1.mp4 |
149.7 MB |
LA274/072 - Determining What an Unknown Program Is Doing — Part 2.mp4 |
80 MB |
LA274/073 - Analyzing an Executable with a Decompiler.mp4 |
159 MB |
LA274/074 - Decompiling Function Parameters and Variables.mp4 |
140.7 MB |
LA274/075 - Reverse Engineering Function Logic with a Decompiler — Part 1.mp4 |
181 MB |
LA274/076 - Reverse Engineering Function Logic with a Decompiler — Part 2.mp4 |
122.9 MB |
LA274/077 - Reverse Engineering Function Logic with a Decompiler — Part 3.mp4 |
149.8 MB |
LA274/078 - Finding Salts in Decompiled Code.mp4 |
156.2 MB |
LA274/079 - Writing a Decryption Program from Pseudocode — Part 1.mp4 |
119.4 MB |
LA274/080 - Writing a Decryption Program from Pseudocode — Part 2.mp4 |
109.4 MB |
LA274/081 - Writing a Decryption Program from Pseudocode — Part 3.mp4 |
43 MB |
LA274/082 - Reverse Engineering Wrap-Up.mp4 |
61.8 MB |
LA274/083 - What Is Metasploit?.mp4 |
103.5 MB |
LA274/084 - Basic Commands.mp4 |
106.2 MB |
LA274/085 - Other Useful Metasploit Commands.mp4 |
113.6 MB |
LA274/086 - Database Setup and ExploitDB.mp4 |
114.2 MB |
LA274/087 - Exploit Usage.mp4 |
54 MB |
LA274/088 - The Post-Exploitation Phase.mp4 |
88 MB |
LA274/089 - Armitage.mp4 |
80.5 MB |
LA274/090 - Shellshock.mp4 |
81 MB |
LA274/091 - Executing Code Remotely with Shellshock.mp4 |
104.2 MB |
LA274/092 - Writing an NSE Script: Headers.mp4 |
65.1 MB |
LA274/093 - Writing an NSE Script: Rules.mp4 |
124.4 MB |
LA274/094 - Writing an NSE Script: Actions.mp4 |
122.6 MB |
LA274/095 - Debugging an NSE Script — Part 1.mp4 |
152.6 MB |
LA274/096 - Debugging an NSE Script — Part 2.mp4 |
52.7 MB |
LA274/097 - Examining a Metasploit Module.mp4 |
98.2 MB |
LA274/098 - Module Script Outline.mp4 |
132.7 MB |
LA274/099 - Loading a Module into Metasploit and Performing a Syntax Check.mp4 |
87.4 MB |
LA274/100 - Deploying and Testing a Script.mp4 |
128.7 MB |
LA274/101 - What's Next?.mp4 |
54.9 MB |