TorBT - Torrents and Magnet Links Search Engine

[ CourseLala.com ] Linkedin - Penetration Testing Active Directory

File Name
Size
Get Bonus Downloads Here.url
180 B
~Get Your Files Here !/01 - Introduction/01 - Understand and test the security of identity providers.mp4
3.4 MB
~Get Your Files Here !/01 - Introduction/01 - Understand and test the security of identity providers.mp4.jpg
181 kB
~Get Your Files Here !/01 - Introduction/01 - Understand and test the security of identity providers.srt
1.3 kB
~Get Your Files Here !/01 - Introduction/02 - What you should know.mp4
1.2 MB
~Get Your Files Here !/01 - Introduction/02 - What you should know.srt
938 B
~Get Your Files Here !/01 - Introduction/03 - Disclaimer.mp4
2.8 MB
~Get Your Files Here !/01 - Introduction/03 - Disclaimer.srt
2.3 kB
~Get Your Files Here !/02 - 1. Introduction to Identities/01 - Understand Active Directory's role in security.mp4
12 MB
~Get Your Files Here !/02 - 1. Introduction to Identities/01 - Understand Active Directory's role in security.srt
8.1 kB
~Get Your Files Here !/02 - 1. Introduction to Identities/02 - The LDAP protocol.mp4
3.9 MB
~Get Your Files Here !/02 - 1. Introduction to Identities/02 - The LDAP protocol.srt
3.0 kB
~Get Your Files Here !/02 - 1. Introduction to Identities/03 - Interact with LDAP at the command line.mp4
8.0 MB
~Get Your Files Here !/02 - 1. Introduction to Identities/03 - Interact with LDAP at the command line.srt
4.6 kB
~Get Your Files Here !/02 - 1. Introduction to Identities/04 - The LDAPAdmin tool.mp4
3.3 MB
~Get Your Files Here !/02 - 1. Introduction to Identities/04 - The LDAPAdmin tool.srt
1.9 kB
~Get Your Files Here !/02 - 1. Introduction to Identities/05 - What is Active Directory.mp4
14 MB
~Get Your Files Here !/02 - 1. Introduction to Identities/05 - What is Active Directory.srt
9.8 kB
~Get Your Files Here !/02 - 1. Introduction to Identities/06 - Interact with Active Directory at the command line.mp4
3.6 MB
~Get Your Files Here !/02 - 1. Introduction to Identities/06 - Interact with Active Directory at the command line.srt
2.4 kB
~Get Your Files Here !/02 - 1. Introduction to Identities/07 - Access LDAP services with a GUI client.mp4
18 MB
~Get Your Files Here !/02 - 1. Introduction to Identities/07 - Access LDAP services with a GUI client.srt
7.1 kB
~Get Your Files Here !/02 - 1. Introduction to Identities/08 - Add users and computers to a domain.mp4
12 MB
~Get Your Files Here !/02 - 1. Introduction to Identities/08 - Add users and computers to a domain.srt
4.4 kB
~Get Your Files Here !/02 - 1. Introduction to Identities/09 - Active Directory security audit.mp4
3.6 MB
~Get Your Files Here !/02 - 1. Introduction to Identities/09 - Active Directory security audit.srt
2.6 kB
~Get Your Files Here !/03 - 2. Testing Active Directory/01 - Set up for testing.mp4
14 MB
~Get Your Files Here !/03 - 2. Testing Active Directory/01 - Set up for testing.srt
6.2 kB
~Get Your Files Here !/03 - 2. Testing Active Directory/02 - Extract the AD hashes.mp4
8.1 MB
~Get Your Files Here !/03 - 2. Testing Active Directory/02 - Extract the AD hashes.srt
3.0 kB
~Get Your Files Here !/03 - 2. Testing Active Directory/03 - Password spraying Active Directory.mp4
7.1 MB
~Get Your Files Here !/03 - 2. Testing Active Directory/03 - Password spraying Active Directory.srt
2.8 kB
~Get Your Files Here !/03 - 2. Testing Active Directory/04 - Kerberos brute-forcing attacks.mp4
6.1 MB
~Get Your Files Here !/03 - 2. Testing Active Directory/04 - Kerberos brute-forcing attacks.srt
3.8 kB
~Get Your Files Here !/03 - 2. Testing Active Directory/05 - Use CrackMapExec to access and enumerate AD.mp4
7.3 MB
~Get Your Files Here !/03 - 2. Testing Active Directory/05 - Use CrackMapExec to access and enumerate AD.srt
3.1 kB
~Get Your Files Here !/03 - 2. Testing Active Directory/06 - Investigate the SYSVOL share.mp4
6.4 MB
~Get Your Files Here !/03 - 2. Testing Active Directory/06 - Investigate the SYSVOL share.srt
3.5 kB
~Get Your Files Here !/03 - 2. Testing Active Directory/07 - Take advantage of legacy data.mp4
5.1 MB
~Get Your Files Here !/03 - 2. Testing Active Directory/07 - Take advantage of legacy data.srt
1.6 kB
~Get Your Files Here !/04 - 3. Advanced Penetration Testing/01 - Specific Active Directory attacks.mp4
2.3 MB
~Get Your Files Here !/04 - 3. Advanced Penetration Testing/01 - Specific Active Directory attacks.srt
1.6 kB
~Get Your Files Here !/04 - 3. Advanced Penetration Testing/02 - Remote extraction of AD hashes.mp4
5.3 MB
~Get Your Files Here !/04 - 3. Advanced Penetration Testing/02 - Remote extraction of AD hashes.srt
2.9 kB
~Get Your Files Here !/04 - 3. Advanced Penetration Testing/03 - Carry out a Kerberos roasting.mp4
4.5 MB
~Get Your Files Here !/04 - 3. Advanced Penetration Testing/03 - Carry out a Kerberos roasting.srt
2.2 kB
~Get Your Files Here !/04 - 3. Advanced Penetration Testing/04 - Run a no-preauthentication attack.mp4
13 MB
~Get Your Files Here !/04 - 3. Advanced Penetration Testing/04 - Run a no-preauthentication attack.srt
3.9 kB
~Get Your Files Here !/04 - 3. Advanced Penetration Testing/05 - Forge a golden ticket.mp4
17 MB
~Get Your Files Here !/04 - 3. Advanced Penetration Testing/05 - Forge a golden ticket.srt
5.9 kB
~Get Your Files Here !/04 - 3. Advanced Penetration Testing/06 - Set the BloodHound loose.mp4
17 MB
~Get Your Files Here !/04 - 3. Advanced Penetration Testing/06 - Set the BloodHound loose.srt
7.2 kB
~Get Your Files Here !/05 - Conclusion/01 - Next steps.mp4
2.2 MB
~Get Your Files Here !/05 - Conclusion/01 - Next steps.srt
1.7 kB
~Get Your Files Here !/Bonus Resources.txt
386 B