TorBT - Torrents and Magnet Links Search Engine

[ CoursePig.com ] Linkedin - CompTIA Pentest + (PT0-002) Cert Prep - 3 Attacks and Exploits (2022)

File Name
Size
Get Bonus Downloads Here.url
179 B
~Get Your Files Here !/01 - 1. Network-Based Attacks/01 - Exploit resources and network attacks.mp4
85 MB
~Get Your Files Here !/01 - 1. Network-Based Attacks/01 - Exploit resources and network attacks.srt
7.6 kB
~Get Your Files Here !/01 - 1. Network-Based Attacks/02 - Network-based exploits.mp4
84 MB
~Get Your Files Here !/01 - 1. Network-Based Attacks/02 - Network-based exploits.srt
12 kB
~Get Your Files Here !/01 - 1. Network-Based Attacks/03 - FTP exploit demo.mp4
81 MB
~Get Your Files Here !/01 - 1. Network-Based Attacks/03 - FTP exploit demo.srt
12 kB
~Get Your Files Here !/01 - 1. Network-Based Attacks/04 - Man-in-the-middle exploits.mp4
86 MB
~Get Your Files Here !/01 - 1. Network-Based Attacks/04 - Man-in-the-middle exploits.srt
11 kB
~Get Your Files Here !/01 - 1. Network-Based Attacks/05 - Labtainers lab TCPIP attacks.mp4
35 MB
~Get Your Files Here !/01 - 1. Network-Based Attacks/05 - Labtainers lab TCPIP attacks.srt
3.4 kB
~Get Your Files Here !/01 - 1. Network-Based Attacks/06 - Labtainers lab ARP spoof attack.mp4
22 MB
~Get Your Files Here !/01 - 1. Network-Based Attacks/06 - Labtainers lab ARP spoof attack.srt
3.0 kB
~Get Your Files Here !/01 - 1. Network-Based Attacks/07 - Labtainers lab Local DNS attacks.mp4
22 MB
~Get Your Files Here !/01 - 1. Network-Based Attacks/07 - Labtainers lab Local DNS attacks.srt
2.6 kB
~Get Your Files Here !/01 - 1. Network-Based Attacks/08 - Labtainers lab MACs and hash functions.mp4
17 MB
~Get Your Files Here !/01 - 1. Network-Based Attacks/08 - Labtainers lab MACs and hash functions.srt
2.4 kB
~Get Your Files Here !/02 - 2. Wireless and RF Attacks/01 - Wireless exploits, part 1.mp4
158 MB
~Get Your Files Here !/02 - 2. Wireless and RF Attacks/01 - Wireless exploits, part 1.srt
22 kB
~Get Your Files Here !/02 - 2. Wireless and RF Attacks/02 - Wireless exploits, part 2.mp4
29 MB
~Get Your Files Here !/02 - 2. Wireless and RF Attacks/02 - Wireless exploits, part 2.srt
4.5 kB
~Get Your Files Here !/02 - 2. Wireless and RF Attacks/03 - Antennas.mp4
67 MB
~Get Your Files Here !/02 - 2. Wireless and RF Attacks/03 - Antennas.srt
6.2 kB
~Get Your Files Here !/03 - 3. Web and Database Attacks/01 - OWASP Top 10.mp4
161 MB
~Get Your Files Here !/03 - 3. Web and Database Attacks/01 - OWASP Top 10.srt
14 kB
~Get Your Files Here !/03 - 3. Web and Database Attacks/02 - Application exploits, part 1.mp4
64 MB
~Get Your Files Here !/03 - 3. Web and Database Attacks/02 - Application exploits, part 1.srt
8.8 kB
~Get Your Files Here !/03 - 3. Web and Database Attacks/03 - SQL injection demo.mp4
84 MB
~Get Your Files Here !/03 - 3. Web and Database Attacks/03 - SQL injection demo.srt
13 kB
~Get Your Files Here !/03 - 3. Web and Database Attacks/04 - Labtainers lab SQL injection.mp4
33 MB
~Get Your Files Here !/03 - 3. Web and Database Attacks/04 - Labtainers lab SQL injection.srt
4.4 kB
~Get Your Files Here !/03 - 3. Web and Database Attacks/05 - Application exploits, part 2.mp4
95 MB
~Get Your Files Here !/03 - 3. Web and Database Attacks/05 - Application exploits, part 2.srt
14 kB
~Get Your Files Here !/03 - 3. Web and Database Attacks/06 - Application exploits, part 3.mp4
107 MB
~Get Your Files Here !/03 - 3. Web and Database Attacks/06 - Application exploits, part 3.srt
15 kB
~Get Your Files Here !/03 - 3. Web and Database Attacks/07 - Cross-site scripting demo.mp4
65 MB
~Get Your Files Here !/03 - 3. Web and Database Attacks/07 - Cross-site scripting demo.srt
11 kB
~Get Your Files Here !/03 - 3. Web and Database Attacks/08 - Labtainers lab Cross-site scripting.mp4
20 MB
~Get Your Files Here !/03 - 3. Web and Database Attacks/08 - Labtainers lab Cross-site scripting.srt
2.7 kB
~Get Your Files Here !/03 - 3. Web and Database Attacks/09 - Labtainers lab Cross-site request forgery.mp4
17 MB
~Get Your Files Here !/03 - 3. Web and Database Attacks/09 - Labtainers lab Cross-site request forgery.srt
1.9 kB
~Get Your Files Here !/03 - 3. Web and Database Attacks/10 - Code vulnerabilities.mp4
198 MB
~Get Your Files Here !/03 - 3. Web and Database Attacks/10 - Code vulnerabilities.srt
30 kB
~Get Your Files Here !/03 - 3. Web and Database Attacks/11 - API attacks and attack resources.mp4
114 MB
~Get Your Files Here !/03 - 3. Web and Database Attacks/11 - API attacks and attack resources.srt
9.8 kB
~Get Your Files Here !/03 - 3. Web and Database Attacks/12 - Privilege escalation Linux.mp4
114 MB
~Get Your Files Here !/03 - 3. Web and Database Attacks/12 - Privilege escalation Linux.srt
16 kB
~Get Your Files Here !/03 - 3. Web and Database Attacks/13 - Privilege escalation Windows.mp4
72 MB
~Get Your Files Here !/03 - 3. Web and Database Attacks/13 - Privilege escalation Windows.srt
11 kB
~Get Your Files Here !/03 - 3. Web and Database Attacks/14 - Miscellaneous privilege escalation.mp4
97 MB
~Get Your Files Here !/03 - 3. Web and Database Attacks/14 - Miscellaneous privilege escalation.srt
12 kB
~Get Your Files Here !/03 - 3. Web and Database Attacks/15 - Miscellaneous local host vulnerabilities.mp4
96 MB
~Get Your Files Here !/03 - 3. Web and Database Attacks/15 - Miscellaneous local host vulnerabilities.srt
13 kB
~Get Your Files Here !/04 - 4. Attacking the Cloud/01 - Cloud attacks, part 1.mp4
69 MB
~Get Your Files Here !/04 - 4. Attacking the Cloud/01 - Cloud attacks, part 1.srt
7.7 kB
~Get Your Files Here !/04 - 4. Attacking the Cloud/02 - Cloud attacks, part 2.mp4
88 MB
~Get Your Files Here !/04 - 4. Attacking the Cloud/02 - Cloud attacks, part 2.srt
7.5 kB
~Get Your Files Here !/05 - 5. Specialized and Fragile Systems/01 - Mobile attacks.mp4
194 MB
~Get Your Files Here !/05 - 5. Specialized and Fragile Systems/01 - Mobile attacks.srt
16 kB
~Get Your Files Here !/05 - 5. Specialized and Fragile Systems/02 - IoT attacks.mp4
196 MB
~Get Your Files Here !/05 - 5. Specialized and Fragile Systems/02 - IoT attacks.srt
16 kB
~Get Your Files Here !/05 - 5. Specialized and Fragile Systems/03 - Data storage and management interface attacks.mp4
168 MB
~Get Your Files Here !/05 - 5. Specialized and Fragile Systems/03 - Data storage and management interface attacks.srt
14 kB
~Get Your Files Here !/05 - 5. Specialized and Fragile Systems/04 - Virtual and containerized environment attacks.mp4
137 MB
~Get Your Files Here !/05 - 5. Specialized and Fragile Systems/04 - Virtual and containerized environment attacks.srt
12 kB
~Get Your Files Here !/05 - 5. Specialized and Fragile Systems/05 - Labtainers lab Industrial control system.mp4
26 MB
~Get Your Files Here !/05 - 5. Specialized and Fragile Systems/05 - Labtainers lab Industrial control system.srt
2.8 kB
~Get Your Files Here !/06 - 6. Social Engineering and Physical Attacks/01 - Pretext for a social engineering attack.mp4
42 MB
~Get Your Files Here !/06 - 6. Social Engineering and Physical Attacks/01 - Pretext for a social engineering attack.srt
3.8 kB
~Get Your Files Here !/06 - 6. Social Engineering and Physical Attacks/02 - Remote social engineering.mp4
72 MB
~Get Your Files Here !/06 - 6. Social Engineering and Physical Attacks/02 - Remote social engineering.srt
9.6 kB
~Get Your Files Here !/06 - 6. Social Engineering and Physical Attacks/03 - Spear phishing demo.mp4
107 MB
~Get Your Files Here !/06 - 6. Social Engineering and Physical Attacks/03 - Spear phishing demo.srt
16 kB
~Get Your Files Here !/06 - 6. Social Engineering and Physical Attacks/04 - In-person social engineering.mp4
140 MB
~Get Your Files Here !/06 - 6. Social Engineering and Physical Attacks/04 - In-person social engineering.srt
19 kB
~Get Your Files Here !/06 - 6. Social Engineering and Physical Attacks/05 - Physical security.mp4
133 MB
~Get Your Files Here !/06 - 6. Social Engineering and Physical Attacks/05 - Physical security.srt
20 kB
~Get Your Files Here !/07 - 7. Post-Exploitation/01 - Post-exploitation techniques.mp4
117 MB
~Get Your Files Here !/07 - 7. Post-Exploitation/01 - Post-exploitation techniques.srt
18 kB
~Get Your Files Here !/07 - 7. Post-Exploitation/02 - Post-exploitation tools.mp4
58 MB
~Get Your Files Here !/07 - 7. Post-Exploitation/02 - Post-exploitation tools.srt
5.5 kB
~Get Your Files Here !/07 - 7. Post-Exploitation/03 - Network segmentation testing.mp4
54 MB
~Get Your Files Here !/07 - 7. Post-Exploitation/03 - Network segmentation testing.srt
3.9 kB
~Get Your Files Here !/07 - 7. Post-Exploitation/04 - Persistence and stealth.mp4
123 MB
~Get Your Files Here !/07 - 7. Post-Exploitation/04 - Persistence and stealth.srt
18 kB
~Get Your Files Here !/07 - 7. Post-Exploitation/05 - Detection avoidance techniques.mp4
118 MB
~Get Your Files Here !/07 - 7. Post-Exploitation/05 - Detection avoidance techniques.srt
9.5 kB
~Get Your Files Here !/Bonus Resources.txt
386 B