BITCQ

ITPT80

Size: 37.3 GB
Magnet link

Name Size
ITPT80/0 - Overview.mp4 157.4 MB
ITPT80/1.11 - Planning an Engagement.mp4 641.1 MB
ITPT80/1.12 - Planning on Engagement Part 2.mp4 622.6 MB
ITPT80/1.13 - Planning an Engagement Part 3.mp4 563.2 MB
ITPT80/1.14 - Planning an Engagement Part 4.mp4 676 MB
ITPT80/1.21 - Legal Concepts.mp4 841.2 MB
ITPT80/1.31 - Scoping an Engagement.mp4 632.3 MB
ITPT80/1.32 - Scoping an Engagement Part 2.mp4 761.1 MB
ITPT80/1.41 - Compliance-Based Assessments.mp4 427.7 MB
ITPT80/2.11 - Pentesting Tools: Use Cases.mp4 327.8 MB
ITPT80/2.12 - Pentesting Tools: Use Cases Part 2.mp4 493.9 MB
ITPT80/2.21 - Pentesting Tools: Scanners.mp4 338.2 MB
ITPT80/2.31 - Pentesting Tools: Credential Testing.mp4 330.8 MB
ITPT80/2.32 - Pentesting Tools: Credential Testing Part 2.mp4 327.7 MB
ITPT80/2.41 - Pentesting Tools: Web Directory Enum.mp4 304.9 MB
ITPT80/2.51 - Pentesting Tools: Debuggers.mp4 487.8 MB
ITPT80/2.61 - Pentesting Tools: OSINT.mp4 329.2 MB
ITPT80/2.71 - Pentesting Tools: Wireless.mp4 274.5 MB
ITPT80/2.81 - Pentesting Tools: Web Proxies.mp4 372.9 MB
ITPT80/2.91 - Pentesting Tools: Social Engineering.mp4 363.4 MB
ITPT80/2.921 - Pentesting Tools: Remote Access.mp4 405.9 MB
ITPT80/2.931 - Pentesting Tools: Networking.mp4 386.5 MB
ITPT80/2.941 - Pentesting Tools: Misc.mp4 367.4 MB
ITPT80/2.951 - Pentesting Tools: Mobile.mp4 282.7 MB
ITPT80/2.961 - Nmap.mp4 452.1 MB
ITPT80/2.971 - Common Pentest Objectives.mp4 485 MB
ITPT80/2.981 - Analyze Scripts: Bash.mp4 446.2 MB
ITPT80/2.982 - Analyze Scripts: Bash Part 2.mp4 410.7 MB
ITPT80/2.983 - Analyze Scripts: Bash Part 3.mp4 389.3 MB
ITPT80/2.991 - Analyze Scripts: Python.mp4 298.4 MB
ITPT80/2.992 - Analyze Scripts: Python Part 2.mp4 278.9 MB
ITPT80/2.993 - Analyze Scripts: Python Part 3.mp4 321.5 MB
ITPT80/2.9991 - Analyze Scripts: Ruby.mp4 284.3 MB
ITPT80/2.9992 - Analyze Scripts: Ruby Part 2.mp4 364.2 MB
ITPT80/2.99991 - Analyze Scripts: PowerShell.mp4 218.2 MB
ITPT80/2.99992 - Analyze Scripts: Powershell Part 2.mp4 282.2 MB
ITPT80/3.11 - Info Gathering Techniques.mp4 375 MB
ITPT80/3.12 - Info Gathering Techniques Part 2.mp4 377.1 MB
ITPT80/3.13 - Info Gathering Techniques Part 3.mp4 490.9 MB
ITPT80/3.14 - Info Gathering Techniques Part 4.mp4 295.5 MB
ITPT80/3.21 - Perform Vulnerability Scans.mp4 476.3 MB
ITPT80/3.22 - Perform Vulnerability Scans Part 2.mp4 468 MB
ITPT80/3.23 - Perform Vulnerability Scans Part 3.mp4 444.1 MB
ITPT80/3.24 - Perform Vulnerability Scans Part 4.mp4 314.6 MB
ITPT80/3.31 - Vulnerability Scan Results.mp4 587.6 MB
ITPT80/3.41 - Exploration Preparation.mp4 512.9 MB
ITPT80/3.42 - Exploration Preparation Part 2.mp4 525.4 MB
ITPT80/3.51 - Weaknesses in Specialized Systems.mp4 618.3 MB
ITPT80/3.52 - Weaknesses in Specialized Systems Part 2.mp4 508.5 MB
ITPT80/4.11 - Social Engineering.mp4 471.1 MB
ITPT80/4.12 - Social Engineering Part 2.mp4 486.3 MB
ITPT80/4.21 - Network Vulnerability: Name Resolution.mp4 506.5 MB
ITPT80/4.31 - Network Vulnerability: SNMP, SMTP and FTP.mp4 351.3 MB
ITPT80/4.41 - Network Vulnerability: Pass-the-Hash.mp4 285.1 MB
ITPT80/4.51 - Network Vulnerabilities: MITM.mp4 660.3 MB
ITPT80/4.61 - Network Vulnerability Denial of Service.mp4 699.5 MB
ITPT80/4.71 - Network Vulnerabilities: NAC Bypass, VLAN Hopping.mp4 409.2 MB
ITPT80/4.81 - App Vulnerabilities Injection Attacks.mp4 235.3 MB
ITPT80/4.82 - App Vulnerabilities Injection Attacks Part 2.mp4 334.9 MB
ITPT80/4.83 - App Vulnerabilities: Injection Attacks Part 3.mp4 531.4 MB
ITPT80/4.91 - App Vulnerabilities: File Inclusions.mp4 358 MB
ITPT80/4.912 - App Vulnerabilities: File Inclusions Part 2.mp4 605.8 MB
ITPT80/4.921 - App Vulnerabilities: XSS, CSRF, Clickjacking.mp4 404.6 MB
ITPT80/4.922 - App Vulnerabilities: XSS, CSRF, Clickjacking Pt2.mp4 433.4 MB
ITPT80/4.931 - App Vulnerabilities: Authentication, Authorization.mp4 617.2 MB
ITPT80/4.941 - App Vulnerabilities: Insecure Coding.mp4 585.5 MB
ITPT80/4.951 - Wireless and RF Vulnerabilities.mp4 615.2 MB
ITPT80/4.952 - Wireless and RF Vulnerabilities Part 2.mp4 734.6 MB
ITPT80/4.961 - Host-Based Vulnerabilities.mp4 801.4 MB
ITPT80/4.962 - Host Based Vulnerabilities Part 2.mp4 565.1 MB
ITPT80/4.963 - Host Based Vulnerabilites Part 3.mp4 862.6 MB
ITPT80/4.964 - Host-Based Vulnerabilities Part 4.mp4 419.7 MB
ITPT80/4.965 - Host-Based Vulnerabilities Part 5.mp4 572 MB
ITPT80/4.971 - Site Security.mp4 571.7 MB
ITPT80/4.972 - Site Security Part 2.mp4 636.8 MB
ITPT80/4.981 - Post-Exploitation.mp4 542.9 MB
ITPT80/4.982 - Post-Exploitation Part 2.mp4 513.3 MB
ITPT80/5.11 - Reports.mp4 646 MB
ITPT80/5.21 - Post Report Activities.mp4 697 MB
ITPT80/5.31 - Vulnerability Mitigation Strategies.mp4 712.4 MB
ITPT80/5.41 - Communication Importance.mp4 354.7 MB
Name
udp://tracker.coppersurfer.tk:6969/announce
udp://tracker.open-internet.nl:6969/announce
udp://tracker.leechers-paradise.org:6969/announce
udp://exodus.desync.com:6969/announce
udp://tracker.internetwarriors.net:1337/announce
udp://tracker.opentrackr.org:1337/announce
udp://9.rarbg.to:2710/announce
udp://9.rarbg.me:2710/announce
http://tracker3.itzmx.com:6961/announce
http://tracker1.itzmx.com:8080/announce
udp://thetracker.org:80/announce
udp://open.demonii.si:1337/announce
udp://bt.xxx-tracker.com:2710/announce
udp://tracker.torrent.eu.org:451/announce
udp://tracker.cyberia.is:6969/announce
udp://tracker.tiny-vps.com:6969/announce
udp://denis.stalker.upeer.me:6969/announce
http://open.acgnxtracker.com:80/announce
udp://ipv4.tracker.harry.lu:80/announce
udp://explodie.org:6969/announce
udp://tracker.opentrackr.org:1337/announce
udp://tracker.zer0day.to:1337/announce
udp://tracker.coppersurfer.tk:6969/announce
udp://tracker.leechers-paradise.org:6969/announce
udp://tracker.internetwarriors.net:1337/announce
udp://mgtracker.org:6969/announce
udp://explodie.org:6969/announce
Name Size Peers
ITPT80 Video 37.3 GB 3

Loading...