TorBT - Torrents and Magnet Links Search Engine

CBTNuggets - Hacker Tools, Techniques, and Incident Handling (SEC504) Online Training 2023-4

File Name
Size
32. Covering Tracks/4. Network Traffic .mp4
520 MB
1. Incident Response/1. Incident Response .mp4
53 MB
1. Incident Response/2. Incident Handling Process .mp4
221 MB
1. Incident Response/3. Preparing for the Incident .mp4
180 MB
1. Incident Response/4. Event Detection .mp4
243 MB
1. Incident Response/5. Eradicate and Recover .mp4
219 MB
1. Incident Response/6. Writing Everything Up .mp4
351 MB
1. Incident Response/7. When is it a Legal Problem .mp4
237 MB
1. Incident Response/8. Interfacing With Law Enforcement .mp4
231 MB
2. Digital Investigations/1. Digital Investigations .mp4
108 MB
2. Digital Investigations/2. Identify Digital Evidence .mp4
303 MB
2. Digital Investigations/3. Understanding the Disc .mp4
249 MB
2. Digital Investigations/4. Basics of Coding .mp4
247 MB
2. Digital Investigations/5. Network Devices .mp4
241 MB
2. Digital Investigations/6. Operating Systems .mp4
237 MB
2. Digital Investigations/7. Reading Materials .mp4
168 MB
3. Live Examination/1. Live Examination -2.mp4
44 MB
3. Live Examination/2. Approaching the System .mp4
231 MB
3. Live Examination/3. Working with FTK .mp4
324 MB
3. Live Examination/4. Working with EnCase .mp4
119 MB
3. Live Examination/5. Watching the System Talk .mp4
289 MB
3. Live Examination/6. Cloning a System .mp4
306 MB
3. Live Examination/7. Moving to the Next Step .mp4
195 MB
4. Network Investigations/1. Network Investigations .mp4
65 MB
4. Network Investigations/2. Session Monitoring .mp4
284 MB
4. Network Investigations/3. Too Many Connections .mp4
371 MB
4. Network Investigations/4. Knowing the Boundaries .mp4
144 MB
4. Network Investigations/5. Packet Reading Basics .mp4
326 MB
4. Network Investigations/6. Network Analysis WITH SSLTLS .mp4
246 MB
5. Memory Investigations/1. Memory Investigations .mp4
91 MB
5. Memory Investigations/2. How RAM Operates .mp4
245 MB
5. Memory Investigations/3. Volatile Memory .mp4
282 MB
5. Memory Investigations/4. Extracting the Memory .mp4
279 MB
5. Memory Investigations/5. Volatility .mp4
317 MB
5. Memory Investigations/6. Comparing to the System .mp4
183 MB
5. Memory Investigations/memory_investigations.zip
2.2 MB
6. Malware Investigations/1. Malware Investigations .mp4
24 MB
6. Malware Investigations/2. Know the Enemy .mp4
154 MB
6. Malware Investigations/3. Malware Alert! .mp4
184 MB
6. Malware Investigations/4. Finding the Malware .mp4
293 MB
6. Malware Investigations/5. The Hunt Begins .mp4
246 MB
6. Malware Investigations/6. What’s in the Payload .mp4
204 MB
6. Malware Investigations/7. Find the Evidence on the Network .mp4
322 MB
6. Malware Investigations/8. Report the Findings .mp4
98 MB
7. Cloud Investigations/1. Cloud Investigations .mp4
80 MB
7. Cloud Investigations/2. Identifying the Different Clouds .mp4
273 MB
7. Cloud Investigations/3. Specializing Those Clouds .mp4
157 MB
7. Cloud Investigations/4. Where is the cloud .mp4
390 MB
7. Cloud Investigations/5. Where are we going .mp4
314 MB
7. Cloud Investigations/6. Understand the flow .mp4
262 MB
7. Cloud Investigations/7. Tool Usage .mp4
213 MB
8. Federal Rules of Evidence/1. Federal Rules of Evidence .mp4
261 MB
8. Federal Rules of Evidence/2. Daubert Standard .mp4
410 MB
8. Federal Rules of Evidence/3. Rule 702 .mp4
212 MB
8. Federal Rules of Evidence/4. Rule 701 .mp4
228 MB
8. Federal Rules of Evidence/5. Rule 901 .mp4
216 MB
8. Federal Rules of Evidence/6. Rule 902 .mp4
188 MB
8. Federal Rules of Evidence/7. Tying it all together.mp4
187 MB
9. MITRE ATT&CK Framework Introduction/1. MITRE ATT&CK Framework Introduction .mp4
34 MB
9. MITRE ATT&CK Framework Introduction/2. Damage Assessment .mp4
323 MB
9. MITRE ATT&CK Framework Introduction/3. Enter the Matrix .mp4
353 MB
9. MITRE ATT&CK Framework Introduction/4. Organizational Assessment .mp4
444 MB
9. MITRE ATT&CK Framework Introduction/5. Whose Fault is it .mp4
376 MB
9. MITRE ATT&CK Framework Introduction/6. Moving to Contain .mp4
322 MB
10. Open-Source Intelligence/1. Open-Source Intelligence.mp4
83 MB
10. Open-Source Intelligence/2. Open-Source Legality .mp4
213 MB
10. Open-Source Intelligence/3. Public Records .mp4
288 MB
10. Open-Source Intelligence/4. Publications and Other Print .mp4
360 MB
10. Open-Source Intelligence/5. Walking Around the Neighborhood .mp4
227 MB
10. Open-Source Intelligence/6. The Google .mp4
202 MB
10. Open-Source Intelligence/7. Time Traveling .mp4
154 MB
10. Open-Source Intelligence/8. Technical Recon .mp4
265 MB
11. DNS Interrogation/1. DNS Interrogation .mp4
19 MB
11. DNS Interrogation/2. What is DNS .mp4
246 MB
11. DNS Interrogation/3. DNS records .mp4
85 MB
11. DNS Interrogation/4. Hijacking DNS .mp4
344 MB
11. DNS Interrogation/5. Crafting DNS Packets .mp4
173 MB
11. DNS Interrogation/6. Verify the DNS .mp4
218 MB
11. DNS Interrogation/7. Zone Transfers .mp4
139 MB
11. DNS Interrogation/8. DNS Defenses .mp4
253 MB
12. Website Reconnaissance/1. Website Reconnaissance .mp4
133 MB
12. Website Reconnaissance/2. Understand the Structure .mp4
329 MB
12. Website Reconnaissance/3. HTML Basics .mp4
274 MB
12. Website Reconnaissance/4. Behind the Scenes .mp4
210 MB
12. Website Reconnaissance/5. Crawling Around .mp4
244 MB
12. Website Reconnaissance/6. Network Signatures .mp4
206 MB
13. Network and Host Scanning with Nmap/1. Network and Host Scanning with Nmap .mp4
154 MB
13. Network and Host Scanning with Nmap/2. Types of Scans .mp4
210 MB
13. Network and Host Scanning with Nmap/3. What the Scans Look Like .mp4
340 MB
13. Network and Host Scanning with Nmap/4. Dusting for Prints .mp4
351 MB
13. Network and Host Scanning with Nmap/5. What’s Under the Mask .mp4
251 MB
14. Enumerating Shadow Cloud Targets/1. Enumerating Shadow Cloud Targets .mp4
116 MB
14. Enumerating Shadow Cloud Targets/2. Shadow Components .mp4
341 MB
14. Enumerating Shadow Cloud Targets/3. Scanning for Clouds .mp4
389 MB
14. Enumerating Shadow Cloud Targets/4. Finding the Key Master .mp4
369 MB
14. Enumerating Shadow Cloud Targets/5. Great Cloud Attacks in History .mp4
279 MB
15. Server Message Block (SMB) Sessions/1. Server Message Block (SMB) Sessions .mp4
23 MB
15. Server Message Block (SMB) Sessions/2. What is SMB .mp4
199 MB
15. Server Message Block (SMB) Sessions/3. SMB Security Features .mp4
175 MB
15. Server Message Block (SMB) Sessions/4. Using SMB .mp4
236 MB
15. Server Message Block (SMB) Sessions/5. SMB Defense .mp4
158 MB
15. Server Message Block (SMB) Sessions/6. Exploiting SMB .mp4
372 MB
16. Defense Spotlight DeepBlueCLI/1. DeepBlueCLI .mp4
46 MB
16. Defense Spotlight DeepBlueCLI/2. Installing DeepBlueCLI .mp4
185 MB
16. Defense Spotlight DeepBlueCLI/3. Using DeepBlueCLI .mp4
275 MB
16. Defense Spotlight DeepBlueCLI/4. Using DeepBlueCLI For Tidbits .mp4
300 MB
16. Defense Spotlight DeepBlueCLI/5. The Alternatives .mp4
284 MB
16. Defense Spotlight DeepBlueCLI/6. Breaking Some Events .mp4
254 MB
16. Defense Spotlight DeepBlueCLI/dfns_sptlght_dpblecli.zip
11 kB
17. Password Attacks/1. Password Attacks .mp4
109 MB
17. Password Attacks/2. What to Attack .mp4
280 MB
17. Password Attacks/3. When to Attack .mp4
289 MB
17. Password Attacks/4. Where to Attack .mp4
258 MB
17. Password Attacks/5. Why (How) to Attack .mp4
191 MB
17. Password Attacks/6. Crossing the Rainbow Bridge .mp4
412 MB
17. Password Attacks/7. Rainbow Addendum .mp4
88 MB
18. Microsoft 365 Attacks/1. Microsoft 365 Attacks .mp4
135 MB
18. Microsoft 365 Attacks/2. Out with the old… .mp4
259 MB
18. Microsoft 365 Attacks/3. Phishing is Still an Issue .mp4
206 MB
18. Microsoft 365 Attacks/4. If We Can’t Play, No One Can .mp4
312 MB
18. Microsoft 365 Attacks/5. Crossing the Different Sites .mp4
271 MB
18. Microsoft 365 Attacks/6. Pivoting and Traffic Analysis .mp4
365 MB
19. Understanding Password Hashes/1. Understanding Password Hashes .mp4
33 MB
19. Understanding Password Hashes/2. What is Hashing .mp4
204 MB
19. Understanding Password Hashes/3. Which Hash to Pick .mp4
226 MB
19. Understanding Password Hashes/4. Hash Collisions .mp4
185 MB
19. Understanding Password Hashes/5. Is Hashing Enough .mp4
233 MB
19. Understanding Password Hashes/6. Building Some Known Hashes .mp4
217 MB
19. Understanding Password Hashes/7. Custom Hash Tables .mp4
323 MB
20. Password Attack Examples/1. Password Attack Exercise .mp4
60 MB
20. Password Attack Examples/2. Hiren (boot disc) .mp4
263 MB
20. Password Attack Examples/3. Salting our Passwords .mp4
202 MB
20. Password Attack Examples/4. Hashcat .mp4
212 MB
20. Password Attack Examples/5. John the Ripper .mp4
256 MB
20. Password Attack Examples/6. Network Device Cracking .mp4
215 MB
21. Cloud Spotlight - Insecure Storage/1. Cloud Spotlight – Insecure Storage .mp4
87 MB
21. Cloud Spotlight - Insecure Storage/2. The Harm in Sharing Too Much .mp4
256 MB
21. Cloud Spotlight - Insecure Storage/3. Default Storage in Windows .mp4
385 MB
21. Cloud Spotlight - Insecure Storage/4. File Sharing in Windows Server .mp4
262 MB
21. Cloud Spotlight - Insecure Storage/5. POSIX-based File Permissions .mp4
235 MB
21. Cloud Spotlight - Insecure Storage/6. Sharing on a Web Server in IIS .mp4
230 MB
22. Multi-Purpose Netcat/1. Multi-purpose Netcat .mp4
114 MB
22. Multi-Purpose Netcat/2. What is Netcat .mp4
156 MB
22. Multi-Purpose Netcat/3. Making Someone Use Netcat .mp4
350 MB
22. Multi-Purpose Netcat/4. What Does Netcat Look Like on the Network .mp4
299 MB
22. Multi-Purpose Netcat/5. Command Access .mp4
278 MB
22. Multi-Purpose Netcat/6. Covering the Tracks .mp4
329 MB
23. Metasploit Framework/1. Metasploit Framework .mp4
172 MB
23. Metasploit Framework/2. Metasploit on Kali .mp4
287 MB
23. Metasploit Framework/3. Systems Without Metasploit .mp4
315 MB
23. Metasploit Framework/4. How to Prep the Target .mp4
208 MB
23. Metasploit Framework/5. Other Metasploit Add-Ins .mp4
144 MB
23. Metasploit Framework/6. Options Outside of Metasploit .mp4
166 MB
24. Drive-By Attacks/1. Drive-By Attacks .mp4
60 MB
24. Drive-By Attacks/2. How a Drive-By Attack is Planned .mp4
291 MB
24. Drive-By Attacks/3. Usual Suspects .mp4
284 MB
24. Drive-By Attacks/4. Turning the Sandbox into a Honeypot .mp4
368 MB
24. Drive-By Attacks/5. Analyze an Attack to Build Against it .mp4
206 MB
24. Drive-By Attacks/6. Using Those Results to Help .mp4
164 MB
24. Drive-By Attacks/drv_by_ttcks.zip
568 B
25. Defense Spotlight System Resource Usage Monitor/1. System Resource Usage Monitor .mp4
40 MB
25. Defense Spotlight System Resource Usage Monitor/2. Windows Resource Monitor .mp4
370 MB
25. Defense Spotlight System Resource Usage Monitor/3. Windows Process IDs .mp4
284 MB
25. Defense Spotlight System Resource Usage Monitor/4. POSIX-Based Resource Monitors .mp4
169 MB
25. Defense Spotlight System Resource Usage Monitor/5. POSIX-Based Process IDs .mp4
229 MB
25. Defense Spotlight System Resource Usage Monitor/6. Sledding Season .mp4
269 MB
25. Defense Spotlight System Resource Usage Monitor/7. Making a NOP Sled .mp4
130 MB
25. Defense Spotlight System Resource Usage Monitor/dfns_sg_mntr.zip
239 B
26. Command Injection/1. Command Injection .mp4
40 MB
26. Command Injection/2. The Good .mp4
217 MB
26. Command Injection/3. The Bad .mp4
352 MB
26. Command Injection/4. And The Ugly .mp4
313 MB
26. Command Injection/5. Where to Command Inject .mp4
369 MB
26. Command Injection/6. More Detailed Hunting .mp4
159 MB
26. Command Injection/cmmnd_njctn.zip
262 B
27. Cross-Site Scripting (XSS)/1. Cross-Site Scripting (XSS) .mp4
66 MB
27. Cross-Site Scripting (XSS)/2. Common Weak Points .mp4
365 MB
27. Cross-Site Scripting (XSS)/3. Directory Browsing .mp4
201 MB
27. Cross-Site Scripting (XSS)/4. Using a Site as Our Own .mp4
310 MB
27. Cross-Site Scripting (XSS)/5. Third-party Protection .mp4
350 MB
27. Cross-Site Scripting (XSS)/6. XSS Review .mp4
240 MB
28. Cloud Spotlight - SSRF and IMDS Attacks/1. Cloud Spotlight – SSRF, IMDS, and SQL Injection Attacks .mp4
75 MB
28. Cloud Spotlight - SSRF and IMDS Attacks/2. WebGoat .mp4
222 MB
28. Cloud Spotlight - SSRF and IMDS Attacks/3. Server-Side Request Forgery (SSRF) .mp4
253 MB
28. Cloud Spotlight - SSRF and IMDS Attacks/4. Cloud Instance Metadata Services Attack .mp4
289 MB
28. Cloud Spotlight - SSRF and IMDS Attacks/5. SQL Injection .mp4
385 MB
28. Cloud Spotlight - SSRF and IMDS Attacks/6. Famous for the Wrong Reasons .mp4
219 MB
29. Endpoint Security Bypass/1. Endpoint Security Bypass .mp4
113 MB
29. Endpoint Security Bypass/2. Bypassing Through Websites .mp4
259 MB
29. Endpoint Security Bypass/3. Piggybacking Off Trusted Applications .mp4
262 MB
29. Endpoint Security Bypass/4. It's a Phony! .mp4
151 MB
29. Endpoint Security Bypass/5. Doing the Research .mp4
171 MB
29. Endpoint Security Bypass/6. Damage the Security .mp4
303 MB
29. Endpoint Security Bypass/7. Keep Updated .mp4
79 MB
30. Pivoting and Lateral Movement/1. Pivoting and Lateral Movement .mp4
89 MB
30. Pivoting and Lateral Movement/2. What’s the Point .mp4
291 MB
30. Pivoting and Lateral Movement/3. Digging on the Initial System .mp4
263 MB
30. Pivoting and Lateral Movement/4. I’m Not Done With You Yet! .mp4
232 MB
30. Pivoting and Lateral Movement/5. Persistence .mp4
396 MB
30. Pivoting and Lateral Movement/6. Internal Threats .mp4
243 MB
30. Pivoting and Lateral Movement/pvtng_ltrl_mvmnt.zip
478 B
31. Hijacking Attacks/1. Hijacking Attacks .mp4
52 MB
31. Hijacking Attacks/2. Predictability .mp4
333 MB
31. Hijacking Attacks/3. Hijacks on the Client Side .mp4
288 MB
31. Hijacking Attacks/4. Man-in-the-Middle .mp4
141 MB
31. Hijacking Attacks/5. Man-in-the-Browser .mp4
279 MB
31. Hijacking Attacks/6. Sending a Care Package .mp4
292 MB
31. Hijacking Attacks/7. Back to the Classics .mp4
115 MB
32. Covering Tracks/1. Covering Tracks .mp4
108 MB
32. Covering Tracks/2. Why Cover Your Tracks .mp4
132 MB
32. Covering Tracks/3. Event Logs .mp4
371 MB
Read me.txt
162 B
32. Covering Tracks/5. It Wasn’t Me! .mp4
237 MB
32. Covering Tracks/6. Destroy the Evidence .mp4
274 MB
33. Establishing Persistence/1. Establishing Persistence .mp4
80 MB
33. Establishing Persistence/2. What is Establishing Persistence.mp4
362 MB
33. Establishing Persistence/3. Applying Open-Source Intelligence .mp4
297 MB
33. Establishing Persistence/4. Reconnaissance Information-Gathering .mp4
464 MB
33. Establishing Persistence/5. Post-Exploitation .mp4
184 MB
33. Establishing Persistence/6. Cloud Post-Exploitation .mp4
336 MB
34. Data Collection/1. Data Collection .mp4
66 MB
34. Data Collection/2. Importance .mp4
349 MB
34. Data Collection/3. Choosing and Configuring Exploits .mp4
332 MB
34. Data Collection/4. Delivering Those Exploits .mp4
285 MB
34. Data Collection/5. Real Intelligence Threat Analytics .mp4
320 MB
34. Data Collection/6. Where to go From Here .mp4
304 MB
35. Attacking Windows Active Directory/1. Attacking Windows Active Directory .mp4
39 MB
35. Attacking Windows Active Directory/2. Knowing Active Directory .mp4
237 MB
35. Attacking Windows Active Directory/3. Target Discovery and Enumeration .mp4
316 MB
35. Attacking Windows Active Directory/4. Asset Compromise .mp4
304 MB
35. Attacking Windows Active Directory/5. Internal Attacker Compromise Attribution .mp4
315 MB
35. Attacking Windows Active Directory/6. Known Active Directory Attacks .mp4
164 MB
35. Attacking Windows Active Directory/7. Email Compromises .mp4
255 MB
36. Password Spray, Guessing, and Credential Stuffing Attacks/1. Password Spray, Guessing, and Credential Stuffing Attacks .mp4
41 MB
36. Password Spray, Guessing, and Credential Stuffing Attacks/2. Password Spraying .mp4
320 MB
36. Password Spray, Guessing, and Credential Stuffing Attacks/3. Password Guessing .mp4
359 MB
36. Password Spray, Guessing, and Credential Stuffing Attacks/4. Credential Stuffing .mp4
240 MB
36. Password Spray, Guessing, and Credential Stuffing Attacks/5. Using the Same Thing Over and Over .mp4
299 MB
36. Password Spray, Guessing, and Credential Stuffing Attacks/6. Time for Reviewing .mp4
242 MB