TorBT - Torrents and Magnet Links Search Engine

Lynda - Penetration Testing - Advanced Kali Linux

File Name
Size
7.6. End-to-End Testing/38.Time to exploit Kronos.mp4
35 MB
1.Introduction/01.Welcome.mp4
7.8 MB
1.Introduction/02.What you should know before watching this course.en.srt
1.6 kB
1.Introduction/02.What you should know before watching this course.mp4
1.3 MB
1.Introduction/03.Disclaimer.en.srt
2.1 kB
1.Introduction/03.Disclaimer.mp4
1.5 MB
2.1. Kali Linux Overview/04.Testing with Kali Linux.en.srt
7.7 kB
2.1. Kali Linux Overview/04.Testing with Kali Linux.mp4
7.2 MB
2.1. Kali Linux Overview/05.Understanding Kali deployments.en.srt
7.9 kB
2.1. Kali Linux Overview/05.Understanding Kali deployments.mp4
7.4 MB
2.1. Kali Linux Overview/06.Preparing your toolbox.en.srt
7.4 kB
2.1. Kali Linux Overview/06.Preparing your toolbox.mp4
13 MB
2.1. Kali Linux Overview/07.Preparing exploits.en.srt
9.6 kB
2.1. Kali Linux Overview/07.Preparing exploits.mp4
16 MB
2.1. Kali Linux Overview/08.Managing the Kali menu.en.srt
2.7 kB
2.1. Kali Linux Overview/08.Managing the Kali menu.mp4
8.5 MB
2.1. Kali Linux Overview/09.Testing with more targets.en.srt
6.8 kB
2.1. Kali Linux Overview/09.Testing with more targets.mp4
12 MB
3.2. System Shells/10.Introduction to shells.en.srt
5.2 kB
3.2. System Shells/10.Introduction to shells.mp4
10 MB
3.2. System Shells/11.Exploring Kali web shells.en.srt
7.3 kB
3.2. System Shells/11.Exploring Kali web shells.mp4
18 MB
3.2. System Shells/12.Weevely.en.srt
5.7 kB
3.2. System Shells/12.Weevely.mp4
12 MB
3.2. System Shells/13.Generating shellcode with MSFvenom.en.srt
5.5 kB
3.2. System Shells/13.Generating shellcode with MSFvenom.mp4
17 MB
3.2. System Shells/14.Injecting images with jhead.en.srt
4.7 kB
3.2. System Shells/14.Injecting images with jhead.mp4
13 MB
3.2. System Shells/15.Using shellcode in exploits.en.srt
3.2 kB
3.2. System Shells/15.Using shellcode in exploits.mp4
7.4 MB
4.3. Exploiting/16.Exploiting systems with Kali.en.srt
1.2 kB
4.3. Exploiting/16.Exploiting systems with Kali.mp4
2.8 MB
4.3. Exploiting/17.Exploiting with Python.en.srt
7.0 kB
4.3. Exploiting/17.Exploiting with Python.mp4
17 MB
4.3. Exploiting/18.Exploiting with Perl.en.srt
3.8 kB
4.3. Exploiting/18.Exploiting with Perl.mp4
7.5 MB
4.3. Exploiting/19.Exploiting with C.en.srt
1.3 kB
4.3. Exploiting/19.Exploiting with C.mp4
3.0 MB
4.3. Exploiting/20.Exploiting with CPP.en.srt
5.3 kB
4.3. Exploiting/20.Exploiting with CPP.mp4
13 MB
4.3. Exploiting/21.Adding another Ruby exploit to Kali.en.srt
1.9 kB
4.3. Exploiting/21.Adding another Ruby exploit to Kali.mp4
4.8 MB
5.4. Passwords/22.Obtaining Windows passwords.en.srt
7.9 kB
5.4. Passwords/22.Obtaining Windows passwords.mp4
18 MB
5.4. Passwords/23.Obtaining Linux passwords.en.srt
2.4 kB
5.4. Passwords/23.Obtaining Linux passwords.mp4
6.4 MB
6.5. Metasploitable/24.Targeting Metasploitable.en.srt
1.0 kB
6.5. Metasploitable/24.Targeting Metasploitable.mp4
1.8 MB
6.5. Metasploitable/25.Exploiting VSFTPD.en.srt
3.4 kB
6.5. Metasploitable/25.Exploiting VSFTPD.mp4
14 MB
6.5. Metasploitable/26.Exploiting with ProFTPd.en.srt
3.4 kB
6.5. Metasploitable/26.Exploiting with ProFTPd.mp4
12 MB
6.5. Metasploitable/27.Exploiting Tomcat.en.srt
3.3 kB
6.5. Metasploitable/27.Exploiting Tomcat.mp4
9.5 MB
6.5. Metasploitable/28.Exploiting IRC.en.srt
923 B
6.5. Metasploitable/28.Exploiting IRC.mp4
4.3 MB
6.5. Metasploitable/29.Exploiting Samba.en.srt
2.0 kB
6.5. Metasploitable/29.Exploiting Samba.mp4
6.5 MB
6.5. Metasploitable/30.Exploiting the distributed compile system.en.srt
1.5 kB
6.5. Metasploitable/30.Exploiting the distributed compile system.mp4
6.0 MB
6.5. Metasploitable/31.Exploiting network files.en.srt
1.8 kB
6.5. Metasploitable/31.Exploiting network files.mp4
6.6 MB
6.5. Metasploitable/32.Hiding in plain sight.en.srt
698 B
6.5. Metasploitable/32.Hiding in plain sight.mp4
2.3 MB
6.5. Metasploitable/33.Escalating to root.en.srt
4.5 kB
6.5. Metasploitable/33.Escalating to root.mp4
14 MB
7.6. End-to-End Testing/34.Hack The Box.en.srt
7.4 kB
7.6. End-to-End Testing/34.Hack The Box.mp4
13 MB
7.6. End-to-End Testing/35.Exploiting rejetto.en.srt
7.7 kB
7.6. End-to-End Testing/35.Exploiting rejetto.mp4
18 MB
7.6. End-to-End Testing/36.Exploiting Windows through EternalBlue.en.srt
5.1 kB
7.6. End-to-End Testing/36.Exploiting Windows through EternalBlue.mp4
21 MB
7.6. End-to-End Testing/37.Exploiting the Devel.en.srt
5.6 kB
7.6. End-to-End Testing/37.Exploiting the Devel.mp4
24 MB
7.6. End-to-End Testing/38.Time to exploit Kronos.en.srt
13 kB
1.Introduction/01.Welcome.en.srt
2.2 kB
8.Conclusion/39.What's next.en.srt
2.4 kB
8.Conclusion/39.What's next.mp4
2.9 MB