TorBT - Torrents and Magnet Links Search Engine
Offensive Security - PEN-200 Penetration Testing with Kali Linux (11.2024)
- Date: 2025-11-22
- Size: 3.4 GB
- Files: 175
File Name
Size
OffSec - PEN-200 Book 2024.11/1. Copyright .html
3.5 MB
OffSec - PEN-200 Book 2024.11/10. SQL Injection Attacks .html
5.1 MB
OffSec - PEN-200 Book 2024.11/11. Client-side Attacks .html
9.4 MB
OffSec - PEN-200 Book 2024.11/12. Locating Public Exploits .html
9.6 MB
OffSec - PEN-200 Book 2024.11/13. Fixing Exploits .html
4.4 MB
OffSec - PEN-200 Book 2024.11/14. Antivirus Evasion .html
6.5 MB
OffSec - PEN-200 Book 2024.11/15. Password Attacks .html
7.3 MB
OffSec - PEN-200 Book 2024.11/16. Windows Privilege Escalation .html
5.2 MB
OffSec - PEN-200 Book 2024.11/17. Linux Privilege Escalation .html
4.0 MB
OffSec - PEN-200 Book 2024.11/18. Port Redirection and SSH Tunneling .html
7.4 MB
OffSec - PEN-200 Book 2024.11/19. Tunneling Through Deep Packet Inspection .html
5.2 MB
OffSec - PEN-200 Book 2024.11/2. Penetration Testing with Kali Linux_ General Course Information .html
3.7 MB
OffSec - PEN-200 Book 2024.11/20. The Metasploit Framework .html
4.4 MB
OffSec - PEN-200 Book 2024.11/21. Active Directory Introduction and Enumeration .html
5.3 MB
OffSec - PEN-200 Book 2024.11/22. Attacking Active Directory Authentication .html
4.2 MB
OffSec - PEN-200 Book 2024.11/23. Lateral Movement in Active Directory .html
4.1 MB
OffSec - PEN-200 Book 2024.11/24. Enumerating AWS Cloud Infrastructure .html
7.2 MB
OffSec - PEN-200 Book 2024.11/25. Attacking AWS Cloud Infrastructure .html
10 MB
OffSec - PEN-200 Book 2024.11/26. Assembling the Pieces .html
6.6 MB
OffSec - PEN-200 Book 2024.11/27. Trying Harder_ The Challenge Labs .html
3.9 MB
OffSec - PEN-200 Book 2024.11/3. Introduction To Cybersecurity .html
6.4 MB
OffSec - PEN-200 Book 2024.11/4. Effective Learning Strategies .html
4.0 MB
OffSec - PEN-200 Book 2024.11/5. Report Writing for Penetration Testers .html
4.8 MB
OffSec - PEN-200 Book 2024.11/6. Information Gathering .html
7.2 MB
OffSec - PEN-200 Book 2024.11/7. Vulnerability Scanning .html
8.3 MB
OffSec - PEN-200 Book 2024.11/8. Introduction to Web Application Attacks .html
11 MB
OffSec - PEN-200 Book 2024.11/9. Common Web Application Attacks .html
9.9 MB
OffSec - PEN-200 Videos 2024.11/01. Vulnerability Scanning/1.1. Vulnerability Scanning with Nessus/1.1.1. Nessus Components .mp4
17 MB
OffSec - PEN-200 Videos 2024.11/01. Vulnerability Scanning/1.1. Vulnerability Scanning with Nessus/1.1.2. Performing a Vulnerability Scan.mp4
16 MB
OffSec - PEN-200 Videos 2024.11/01. Vulnerability Scanning/1.1. Vulnerability Scanning with Nessus/1.1.3. Analyzing the Results .mp4
22 MB
OffSec - PEN-200 Videos 2024.11/01. Vulnerability Scanning/1.1. Vulnerability Scanning with Nessus/1.1.4. Performing an Authenticated Vulnerability Scan .mp4
20 MB
OffSec - PEN-200 Videos 2024.11/01. Vulnerability Scanning/1.1. Vulnerability Scanning with Nessus/1.1.5. Working with Nessus Plugins .mp4
22 MB
OffSec - PEN-200 Videos 2024.11/01. Vulnerability Scanning/1.2. Vulnerability Scanning with Nmap/1.2.1. NSE Vulnerability Scripts .mp4
20 MB
OffSec - PEN-200 Videos 2024.11/01. Vulnerability Scanning/1.2. Vulnerability Scanning with Nmap/1.2.2. Working with NSE Scripts .mp4
12 MB
OffSec - PEN-200 Videos 2024.11/02. Introduction to Web Application Attacks/2.1. Web Application Assessment Tools/2.1.1. Fingerprinting Web Servers with Nmap .mp4
3.4 MB
OffSec - PEN-200 Videos 2024.11/02. Introduction to Web Application Attacks/2.1. Web Application Assessment Tools/2.1.2. Directory Brute Force with Gobuster .mp4
3.9 MB
OffSec - PEN-200 Videos 2024.11/02. Introduction to Web Application Attacks/2.1. Web Application Assessment Tools/2.1.3. Security Testing with Burp Suite .mp4
34 MB
OffSec - PEN-200 Videos 2024.11/02. Introduction to Web Application Attacks/2.2. Web Application Enumeration/2.2.1. Debugging Page Content .mp4
13 MB
OffSec - PEN-200 Videos 2024.11/02. Introduction to Web Application Attacks/2.2. Web Application Enumeration/2.2.2. Inspecting HTTP Response Headers and Sitemaps .mp4
12 MB
OffSec - PEN-200 Videos 2024.11/02. Introduction to Web Application Attacks/2.2. Web Application Enumeration/2.2.3. Enumerating and Abusing APIs .mp4
28 MB
OffSec - PEN-200 Videos 2024.11/02. Introduction to Web Application Attacks/2.3. Cross-Site Scripting/2.3.1. Basic XSS .mp4
15 MB
OffSec - PEN-200 Videos 2024.11/02. Introduction to Web Application Attacks/2.3. Cross-Site Scripting/2.3.2. Privilege Escalation via XSS .mp4
34 MB
OffSec - PEN-200 Videos 2024.11/03. Common Web Application Attacks/3.1. Directory Traversal/3.1.1. Absolute vs Relative Paths .mp4
14 MB
OffSec - PEN-200 Videos 2024.11/03. Common Web Application Attacks/3.1. Directory Traversal/3.1.2. Identifying and Exploiting Directory Traversals .mp4
38 MB
OffSec - PEN-200 Videos 2024.11/03. Common Web Application Attacks/3.1. Directory Traversal/3.1.3. Encoding Special Characters .mp4
5.8 MB
OffSec - PEN-200 Videos 2024.11/03. Common Web Application Attacks/3.2. File Inclusion Vulnerabilities/3.2.1. Local File Inclusion (LFI) .mp4
45 MB
OffSec - PEN-200 Videos 2024.11/03. Common Web Application Attacks/3.2. File Inclusion Vulnerabilities/3.2.2. PHP Wrappers .mp4
16 MB
OffSec - PEN-200 Videos 2024.11/03. Common Web Application Attacks/3.2. File Inclusion Vulnerabilities/3.2.3. Remote File Inclusion (RFI) .mp4
7.0 MB
OffSec - PEN-200 Videos 2024.11/03. Common Web Application Attacks/3.3. File Upload Vulnerabilities/3.3.1. Using Executable Files .mp4
30 MB
OffSec - PEN-200 Videos 2024.11/03. Common Web Application Attacks/3.3. File Upload Vulnerabilities/3.3.2. Using Non-Executable Files .mp4
30 MB
OffSec - PEN-200 Videos 2024.11/03. Common Web Application Attacks/3.4. Command Injection/3.4.1. OS Command Injection .mp4
23 MB
OffSec - PEN-200 Videos 2024.11/04. SQL Injection Attacks/4.1. SQL Theory and Databases/4.1.1. DB Types and Characteristics .mp4
12 MB
OffSec - PEN-200 Videos 2024.11/04. SQL Injection Attacks/4.2. Manual SQL Exploitation/4.2.1. Identifying SQLi via Error-based Paylaods .mp4
12 MB
OffSec - PEN-200 Videos 2024.11/04. SQL Injection Attacks/4.2. Manual SQL Exploitation/4.2.2. UNION-based Payloads .mp4
14 MB
OffSec - PEN-200 Videos 2024.11/04. SQL Injection Attacks/4.2. Manual SQL Exploitation/4.2.3. Blind SQL Injections .mp4
7.1 MB
OffSec - PEN-200 Videos 2024.11/04. SQL Injection Attacks/4.3. Manual and Automated Code Execution/4.3.1. Manual Code Execution .mp4
11 MB
OffSec - PEN-200 Videos 2024.11/04. SQL Injection Attacks/4.3. Manual and Automated Code Execution/4.3.2. Automating the Attack .mp4
24 MB
OffSec - PEN-200 Videos 2024.11/05. Client-side Attacks/5.1. Target Reconnaissance/5.1.1. Information Gathering .mp4
12 MB
OffSec - PEN-200 Videos 2024.11/05. Client-side Attacks/5.1. Target Reconnaissance/5.1.2. Client Fingerprinting .mp4
17 MB
OffSec - PEN-200 Videos 2024.11/05. Client-side Attacks/5.2. Exploiting Microsoft Office/5.2.1. Leveraging Microsoft Word Macros .mp4
38 MB
OffSec - PEN-200 Videos 2024.11/05. Client-side Attacks/5.3. Abusing Windows Library Files/5.3.1. Obtaining Code Execution via Windows Library Files .mp4
45 MB
OffSec - PEN-200 Videos 2024.11/06. Locating Public Exploits/6.1. Offline Exploit Resources/6.1.1. SearchSploit .mp4
18 MB
OffSec - PEN-200 Videos 2024.11/06. Locating Public Exploits/6.1. Offline Exploit Resources/6.1.2. Nmap NSE Scripts .mp4
4.3 MB
OffSec - PEN-200 Videos 2024.11/06. Locating Public Exploits/6.2. Exploiting a Target/6.2.1. Putting It Together .mp4
34 MB
OffSec - PEN-200 Videos 2024.11/07. Information Gathering/7.1. Passive Information Gathering/7.1.1. Whois Enumeration .mp4
7.8 MB
OffSec - PEN-200 Videos 2024.11/07. Information Gathering/7.1. Passive Information Gathering/7.1.2. Google Hacking .mp4
13 MB
OffSec - PEN-200 Videos 2024.11/07. Information Gathering/7.1. Passive Information Gathering/7.1.3. Netcraft .mp4
6.0 MB
OffSec - PEN-200 Videos 2024.11/07. Information Gathering/7.1. Passive Information Gathering/7.1.4. Open-Source Code .mp4
5.1 MB
OffSec - PEN-200 Videos 2024.11/07. Information Gathering/7.1. Passive Information Gathering/7.1.5. Shodan .mp4
9.7 MB
OffSec - PEN-200 Videos 2024.11/07. Information Gathering/7.1. Passive Information Gathering/7.1.6. Security Headers and SSL_TLS .mp4
7.3 MB
OffSec - PEN-200 Videos 2024.11/07. Information Gathering/7.2. Active Information Gathering/7.2.1. DNS Enumeration .mp4
31 MB
OffSec - PEN-200 Videos 2024.11/07. Information Gathering/7.2. Active Information Gathering/7.2.2. Port Scanning with Nmap .mp4
41 MB
OffSec - PEN-200 Videos 2024.11/07. Information Gathering/7.2. Active Information Gathering/7.2.3. SMB Enumeration .mp4
13 MB
OffSec - PEN-200 Videos 2024.11/07. Information Gathering/7.2. Active Information Gathering/7.2.4. SMTP Enumeration .mp4
8.0 MB
OffSec - PEN-200 Videos 2024.11/07. Information Gathering/7.2. Active Information Gathering/7.2.5. SNMP Enumeration .mp4
19 MB
OffSec - PEN-200 Videos 2024.11/08. Fixing Exploits/8.1. Fixing Memory Corruption Exploits/8.1.1. Importing and Examining the Exploit .mp4
7.7 MB
OffSec - PEN-200 Videos 2024.11/08. Fixing Exploits/8.1. Fixing Memory Corruption Exploits/8.1.2. Cross-Compiling Exploit Code .mp4
7.7 MB
OffSec - PEN-200 Videos 2024.11/08. Fixing Exploits/8.1. Fixing Memory Corruption Exploits/8.1.3. Fixing the Exploit .mp4
33 MB
OffSec - PEN-200 Videos 2024.11/08. Fixing Exploits/8.1. Fixing Memory Corruption Exploits/8.1.4. Changing the Overflow Buffer .mp4
18 MB
OffSec - PEN-200 Videos 2024.11/08. Fixing Exploits/8.2. Fixing Web Exploits/8.2.1. Selecting the Vulnerability and Fixing the Code .mp4
14 MB
OffSec - PEN-200 Videos 2024.11/08. Fixing Exploits/8.2. Fixing Web Exploits/8.2.2. Troubleshooting the 'index out of range' Error .mp4
16 MB
OffSec - PEN-200 Videos 2024.11/09. Antivirus Evasion/9.1. Antivirus Software Key Components and Operations/9.1.1. Detection Methods .mp4
19 MB
OffSec - PEN-200 Videos 2024.11/09. Antivirus Evasion/9.2. AV Evasion in Practice/9.2.1. Evading AV with Thread Injection .mp4
56 MB
OffSec - PEN-200 Videos 2024.11/09. Antivirus Evasion/9.2. AV Evasion in Practice/9.2.2. Automating the Process .mp4
27 MB
OffSec - PEN-200 Videos 2024.11/10. Password Attacks/10.1. Attacking Network Services Logins/10.1.1. SSH and RDP .mp4
14 MB
OffSec - PEN-200 Videos 2024.11/10. Password Attacks/10.1. Attacking Network Services Logins/10.1.2. HTTP POST Login Form .mp4
21 MB
OffSec - PEN-200 Videos 2024.11/10. Password Attacks/10.2. Password Cracking Fundamentals/10.2.1. Introduction to Encryption, Hashes and Cracking .mp4
20 MB
OffSec - PEN-200 Videos 2024.11/10. Password Attacks/10.2. Password Cracking Fundamentals/10.2.2. Mutating Wordlists .mp4
32 MB
OffSec - PEN-200 Videos 2024.11/10. Password Attacks/10.2. Password Cracking Fundamentals/10.2.3. Password Manager .mp4
29 MB
OffSec - PEN-200 Videos 2024.11/10. Password Attacks/10.2. Password Cracking Fundamentals/10.2.4. SSH Private Key Passphrase .mp4
33 MB
OffSec - PEN-200 Videos 2024.11/10. Password Attacks/10.3. Working with Password Hashes/10.3.1. Cracking NTLM .mp4
27 MB
OffSec - PEN-200 Videos 2024.11/10. Password Attacks/10.3. Working with Password Hashes/10.3.2. Passing NTLM .mp4
28 MB
OffSec - PEN-200 Videos 2024.11/10. Password Attacks/10.3. Working with Password Hashes/10.3.3. Cracking Net-NTLMv2 .mp4
21 MB
OffSec - PEN-200 Videos 2024.11/10. Password Attacks/10.3. Working with Password Hashes/10.3.4. Relaying Net-NTLMv2 .mp4
17 MB
OffSec - PEN-200 Videos 2024.11/11. Windows Privilege Escalation/11.1. Enumerating Windows/11.1.1. Situational Awareness .mp4
65 MB
OffSec - PEN-200 Videos 2024.11/11. Windows Privilege Escalation/11.1. Enumerating Windows/11.1.2. Hidden in Plain View .mp4
41 MB
OffSec - PEN-200 Videos 2024.11/11. Windows Privilege Escalation/11.1. Enumerating Windows/11.1.3. Information Goldmine PowerShell .mp4
37 MB
OffSec - PEN-200 Videos 2024.11/11. Windows Privilege Escalation/11.1. Enumerating Windows/11.1.4. Automated Enumeration .mp4
30 MB
OffSec - PEN-200 Videos 2024.11/11. Windows Privilege Escalation/11.2. Leveraging Windows Services/11.2.1. Service Binary Hijacking .mp4
65 MB
OffSec - PEN-200 Videos 2024.11/11. Windows Privilege Escalation/11.2. Leveraging Windows Services/11.2.2. DLL Hijacking .mp4
87 MB
OffSec - PEN-200 Videos 2024.11/11. Windows Privilege Escalation/11.2. Leveraging Windows Services/11.2.3. Unquoted Service Paths .mp4
60 MB
OffSec - PEN-200 Videos 2024.11/11. Windows Privilege Escalation/11.3. Abusing Other Windows Components/11.3.1. Scheduled Tasks .mp4
20 MB
OffSec - PEN-200 Videos 2024.11/11. Windows Privilege Escalation/11.3. Abusing Other Windows Components/11.3.2. Using Exploits .mp4
22 MB
OffSec - PEN-200 Videos 2024.11/12. Linux Privilege Escalation/12.1. Enumerating Linux/12.1.1. Manual Enumeration .mp4
73 MB
OffSec - PEN-200 Videos 2024.11/12. Linux Privilege Escalation/12.1. Enumerating Linux/12.1.2. Automated Enumeration .mp4
11 MB
OffSec - PEN-200 Videos 2024.11/12. Linux Privilege Escalation/12.2. Exposed Confidential Information/12.2.1. Inspecting User Trails .mp4
17 MB
OffSec - PEN-200 Videos 2024.11/12. Linux Privilege Escalation/12.2. Exposed Confidential Information/12.2.2. Inspecting Service Footprints .mp4
7.5 MB
OffSec - PEN-200 Videos 2024.11/12. Linux Privilege Escalation/12.3. Insecure File Permissions/12.3.1. Abusing Cron Jobs .mp4
10 MB
OffSec - PEN-200 Videos 2024.11/12. Linux Privilege Escalation/12.3. Insecure File Permissions/12.3.2. Abusing Password Authentication .mp4
6.9 MB
OffSec - PEN-200 Videos 2024.11/12. Linux Privilege Escalation/12.4. Insecure System Components/12.4.1. Abusing Setuid Binaries and Capabilities .mp4
21 MB
OffSec - PEN-200 Videos 2024.11/12. Linux Privilege Escalation/12.4. Insecure System Components/12.4.2. Abusing Sudo .mp4
15 MB
OffSec - PEN-200 Videos 2024.11/12. Linux Privilege Escalation/12.4. Insecure System Components/12.4.3. Exploiting Kernel Vulnerabilities .mp4
16 MB
OffSec - PEN-200 Videos 2024.11/13. Port Redirection and SSH Tunneling/13.1. Port Forwarding with Linux Tools/13.1.1. A Simple Port Forwarding Scenario .mp4
7.5 MB
OffSec - PEN-200 Videos 2024.11/13. Port Redirection and SSH Tunneling/13.1. Port Forwarding with Linux Tools/13.1.2. Setting Up the Lab Environment .mp4
34 MB
OffSec - PEN-200 Videos 2024.11/13. Port Redirection and SSH Tunneling/13.1. Port Forwarding with Linux Tools/13.1.3. Port Forwarding with Socat .mp4
29 MB
OffSec - PEN-200 Videos 2024.11/13. Port Redirection and SSH Tunneling/13.2. SSH Tunneling/13.2.1. SSH Local Port Forwarding .mp4
46 MB
OffSec - PEN-200 Videos 2024.11/13. Port Redirection and SSH Tunneling/13.2. SSH Tunneling/13.2.2. SSH Dynamic Port Forwarding .mp4
26 MB
OffSec - PEN-200 Videos 2024.11/13. Port Redirection and SSH Tunneling/13.2. SSH Tunneling/13.2.3. SSH Remote Port Forwarding .mp4
17 MB
OffSec - PEN-200 Videos 2024.11/13. Port Redirection and SSH Tunneling/13.2. SSH Tunneling/13.2.4. SSH Remote Dynamic Port Forwarding .mp4
16 MB
OffSec - PEN-200 Videos 2024.11/13. Port Redirection and SSH Tunneling/13.2. SSH Tunneling/13.2.5. Using sshuttle .mp4
7.0 MB
OffSec - PEN-200 Videos 2024.11/13. Port Redirection and SSH Tunneling/13.3. Port Forwarding with Windows Tools/13.3.1. ssh.exe .mp4
12 MB
OffSec - PEN-200 Videos 2024.11/13. Port Redirection and SSH Tunneling/13.3. Port Forwarding with Windows Tools/13.3.2. Plink .mp4
20 MB
OffSec - PEN-200 Videos 2024.11/13. Port Redirection and SSH Tunneling/13.3. Port Forwarding with Windows Tools/13.3.3. Netsh .mp4
24 MB
OffSec - PEN-200 Videos 2024.11/14. Tunneling Through Deep Packet Inspection/14.1. HTTP Tunneling Theory and Practice/14.1.1. HTTP Tunneling Fundamentals .mp4
4.6 MB
OffSec - PEN-200 Videos 2024.11/14. Tunneling Through Deep Packet Inspection/14.1. HTTP Tunneling Theory and Practice/14.1.2. HTTP Tunneling with Chisel .mp4
24 MB
OffSec - PEN-200 Videos 2024.11/14. Tunneling Through Deep Packet Inspection/14.2. DNS Tunneling Theory and Practice/14.2.1. DNS Tunneling Fundamentals .mp4
43 MB
OffSec - PEN-200 Videos 2024.11/14. Tunneling Through Deep Packet Inspection/14.2. DNS Tunneling Theory and Practice/14.2.2. DNS Tunneling with dnscat2 .mp4
25 MB
OffSec - PEN-200 Videos 2024.11/15. The Metasploit Framework/15.1. Getting Familiar with Metasploit/15.1.1. Setup and Work with MSF .mp4
17 MB
OffSec - PEN-200 Videos 2024.11/15. The Metasploit Framework/15.1. Getting Familiar with Metasploit/15.1.2. Auxiliary Modules .mp4
28 MB
OffSec - PEN-200 Videos 2024.11/15. The Metasploit Framework/15.1. Getting Familiar with Metasploit/15.1.3. Exploit Modules .mp4
32 MB
OffSec - PEN-200 Videos 2024.11/15. The Metasploit Framework/15.2. Using Metasploit Payloads/15.2.1. Staged vs Non-Staged Payloads .mp4
10 MB
OffSec - PEN-200 Videos 2024.11/15. The Metasploit Framework/15.2. Using Metasploit Payloads/15.2.2. Meterpreter Payload .mp4
49 MB
OffSec - PEN-200 Videos 2024.11/15. The Metasploit Framework/15.2. Using Metasploit Payloads/15.2.3. Executable Payloads .mp4
24 MB
OffSec - PEN-200 Videos 2024.11/15. The Metasploit Framework/15.3. Performing Post-Exploitation with Metasploit/15.3.1. Core Meterpreter Post-Exploitation Features .mp4
39 MB
OffSec - PEN-200 Videos 2024.11/15. The Metasploit Framework/15.3. Performing Post-Exploitation with Metasploit/15.3.2. Post-Exploitation Modules .mp4
33 MB
OffSec - PEN-200 Videos 2024.11/15. The Metasploit Framework/15.3. Performing Post-Exploitation with Metasploit/15.3.3. Pivoting with Metasploit .mp4
37 MB
OffSec - PEN-200 Videos 2024.11/15. The Metasploit Framework/15.4. Automating Metasploit/15.4.1. Resource Scripts .mp4
17 MB
OffSec - PEN-200 Videos 2024.11/16. Active Directory Introduction and Enumeration/16.1. Active Directory - Manual Enumeration/16.1.1. Active Directory - Enumeration Using Legacy Windows Tools .mp4
9.7 MB
OffSec - PEN-200 Videos 2024.11/16. Active Directory Introduction and Enumeration/16.1. Active Directory - Manual Enumeration/16.1.2. Enumerating Active Directory using PowerShell and .NET Classes .mp4
20 MB
OffSec - PEN-200 Videos 2024.11/16. Active Directory Introduction and Enumeration/16.1. Active Directory - Manual Enumeration/16.1.3. Adding Search Functionality to our Script .mp4
55 MB
OffSec - PEN-200 Videos 2024.11/16. Active Directory Introduction and Enumeration/16.1. Active Directory - Manual Enumeration/16.1.4. AD Enumeration with PowerView .mp4
9.6 MB
OffSec - PEN-200 Videos 2024.11/16. Active Directory Introduction and Enumeration/16.2. Manual Enumeration - Expanding our Repertoire/16.2.1. Enumerating Operating Systems .mp4
4.1 MB
OffSec - PEN-200 Videos 2024.11/16. Active Directory Introduction and Enumeration/16.2. Manual Enumeration - Expanding our Repertoire/16.2.2. Getting an Overview - Permissions and Logged on Users .mp4
33 MB
OffSec - PEN-200 Videos 2024.11/16. Active Directory Introduction and Enumeration/16.2. Manual Enumeration - Expanding our Repertoire/16.2.3. Enumeration Through Service Principal Names .mp4
6.5 MB
OffSec - PEN-200 Videos 2024.11/16. Active Directory Introduction and Enumeration/16.2. Manual Enumeration - Expanding our Repertoire/16.2.4. Enumerating Object Permissions .mp4
19 MB
OffSec - PEN-200 Videos 2024.11/16. Active Directory Introduction and Enumeration/16.2. Manual Enumeration - Expanding our Repertoire/16.2.5. Enumerating Domain Shares .mp4
15 MB
OffSec - PEN-200 Videos 2024.11/16. Active Directory Introduction and Enumeration/16.3. Active Directory - Automated Enumeration/16.3.1. Collecting Data with SharpHound .mp4
8.4 MB
OffSec - PEN-200 Videos 2024.11/16. Active Directory Introduction and Enumeration/16.3. Active Directory - Automated Enumeration/16.3.2. Analysing Data using BloodHound .mp4
46 MB
OffSec - PEN-200 Videos 2024.11/17. Attacking Active Directory Authentication/17.1. Understanding Active Directory Authentication/17.1.1. Cached AD Credentials .mp4
18 MB
OffSec - PEN-200 Videos 2024.11/17. Attacking Active Directory Authentication/17.2. Performing Attacks on Active Directory Authentication/17.2.1. Password Attacks .mp4
30 MB
OffSec - PEN-200 Videos 2024.11/17. Attacking Active Directory Authentication/17.2. Performing Attacks on Active Directory Authentication/17.2.2. AS-REP Roasting .mp4
17 MB
OffSec - PEN-200 Videos 2024.11/17. Attacking Active Directory Authentication/17.2. Performing Attacks on Active Directory Authentication/17.2.3. Kerberoasting .mp4
25 MB
OffSec - PEN-200 Videos 2024.11/17. Attacking Active Directory Authentication/17.2. Performing Attacks on Active Directory Authentication/17.2.4. Silver Tickets .mp4
23 MB
OffSec - PEN-200 Videos 2024.11/17. Attacking Active Directory Authentication/17.2. Performing Attacks on Active Directory Authentication/17.2.5. Domain Controller Synchronization .mp4
14 MB
OffSec - PEN-200 Videos 2024.11/18. Lateral Movement in Active Directory/18.1. Active Directory Lateral Movement Techniques/18.1.1. WMI and WinRM .mp4
29 MB
OffSec - PEN-200 Videos 2024.11/18. Lateral Movement in Active Directory/18.1. Active Directory Lateral Movement Techniques/18.1.2. PsExec .mp4
4.4 MB
OffSec - PEN-200 Videos 2024.11/18. Lateral Movement in Active Directory/18.1. Active Directory Lateral Movement Techniques/18.1.3. Pass the Hash .mp4
3.6 MB
OffSec - PEN-200 Videos 2024.11/18. Lateral Movement in Active Directory/18.1. Active Directory Lateral Movement Techniques/18.1.4. Overpass the Hash .mp4
22 MB
OffSec - PEN-200 Videos 2024.11/18. Lateral Movement in Active Directory/18.1. Active Directory Lateral Movement Techniques/18.1.5. Pass the Ticket .mp4
21 MB
OffSec - PEN-200 Videos 2024.11/18. Lateral Movement in Active Directory/18.1. Active Directory Lateral Movement Techniques/18.1.6. DCOM .mp4
10 MB
OffSec - PEN-200 Videos 2024.11/18. Lateral Movement in Active Directory/18.2. Active Directory Persistence/18.2.1. Golden Ticket .mp4
17 MB
OffSec - PEN-200 Videos 2024.11/18. Lateral Movement in Active Directory/18.2. Active Directory Persistence/18.2.2. Shadow Copies .mp4
9.7 MB
OffSec - PEN-200 Videos 2024.11/19. Assembling the Pieces/19.1. Enumerating the Public Network/19.1.1. MAILSRV1 .mp4
18 MB
OffSec - PEN-200 Videos 2024.11/19. Assembling the Pieces/19.1. Enumerating the Public Network/19.1.2. WEBSRV1 .mp4
38 MB
OffSec - PEN-200 Videos 2024.11/19. Assembling the Pieces/19.1. Enumerating the Public Network .mp4
1.8 MB
OffSec - PEN-200 Videos 2024.11/19. Assembling the Pieces/19.2. Attacking a Public Machine/19.2.1. Initial Foothold .mp4
18 MB
OffSec - PEN-200 Videos 2024.11/19. Assembling the Pieces/19.2. Attacking a Public Machine/19.2.2. A Link to the Past .mp4
54 MB
OffSec - PEN-200 Videos 2024.11/19. Assembling the Pieces/19.3. Gaining Access to the Internal Network/19.3.1. Domain Credentials .mp4
15 MB
OffSec - PEN-200 Videos 2024.11/19. Assembling the Pieces/19.3. Gaining Access to the Internal Network/19.3.2. Phishing for Access .mp4
29 MB
OffSec - PEN-200 Videos 2024.11/19. Assembling the Pieces/19.4. Enumerating the Internal Network/19.4.1. Situational Awareness .mp4
50 MB
OffSec - PEN-200 Videos 2024.11/19. Assembling the Pieces/19.4. Enumerating the Internal Network/19.4.2. Services and Sessions .mp4
46 MB
OffSec - PEN-200 Videos 2024.11/19. Assembling the Pieces/19.5. Attacking an Internal Web Application/19.5.1. Speak Kerberoast and Enter .mp4
13 MB
OffSec - PEN-200 Videos 2024.11/19. Assembling the Pieces/19.5. Attacking an Internal Web Application/19.5.2. Abuse a WordPress Plugin for a Relay Attack .mp4
38 MB
OffSec - PEN-200 Videos 2024.11/19. Assembling the Pieces/19.6. Gaining Access to the Domain Controller/19.6.1. Cached Credentials .mp4
9.1 MB
OffSec - PEN-200 Videos 2024.11/19. Assembling the Pieces/19.6. Gaining Access to the Domain Controller/19.6.2. Lateral Movement .mp4
4.0 MB