TorBT - Torrents and Magnet Links Search Engine

CBTNugget - Penetration Testing Tools

File Name
Size
1. Pentesting Reconnaissance.mp4
26 MB
2. Pentesting Reconnaissance Tools.mp4
41 MB
3. Domain Information Tools.mp4
72 MB
4. IP and DNS Information Tools.mp4
52 MB
5. Combination OSINT Tools.mp4
72 MB
6. Breach Data Tools.mp4
25 MB
7. Pentesting Reconnaissance Review.mp4
17 MB
8. Intro to Pentesting Enumeration.mp4
45 MB
9. Pentest Enumeration Tools.mp4
52 MB
10. Basic NMAP Commands.mp4
28 MB
11. Ping Scans with NMAP.mp4
22 MB
12. Scanning TCP and UDP with NMAP.mp4
32 MB
13. Identifying Host Attributes with NMAP.mp4
38 MB
14. Using NMAP Scripts.mp4
34 MB
15. Bypassing Firewalls with NMAP.mp4
34 MB
16. Intro to Enumerating Services and Vulnerabilities.mp4
14 MB
17. Enumerating with Port Scanners.mp4
96 MB
18. Enumerating Web Servers.mp4
114 MB
19. Enumerating SMB and Shares.mp4
62 MB
20. Enumerating Vulnerabilities with Nessus.mp4
89 MB
21. Automating Enumeration.mp4
52 MB
22. Pentest Enumeration Review.mp4
19 MB
23. Social Engineering Anatomy.mp4
57 MB
24. Social Engineering Attacks.mp4
40 MB
25. Social Engineering Tools.mp4
40 MB
26. Social Engineering Toolkit.mp4
98 MB
27. Using WifiPhisher.mp4
17 MB
28. Pharming With ShellPhish.mp4
37 MB
29. Social Engineering Review.mp4
21 MB
30. Exploits and Payloads.mp4
40 MB
31. Moving Files With PwnDrop.mp4
70 MB
32. Transferring Files with SMB and SCP.mp4
49 MB
33. Working With Exploits.mp4
104 MB
34. Working With Payloads.mp4
47 MB
35. Exploits and Payloads Review.mp4
8.9 MB
36. Intro to the Metasploit Framework.mp4
24 MB
37. Metasploit Startup and Workspaces.mp4
40 MB
38. Metasploit Modules.mp4
68 MB
39. Metasploit Options and Payloads.mp4
83 MB
40. Managing Metasploit Sessions.mp4
23 MB
41. Using Meterpreter.mp4
68 MB
42. Metasploit Framework Review.mp4
10 MB
43. Network Based Attacks and Tools.mp4
53 MB
44. How Attacks Against ARP Work.mp4
32 MB
45. ARP Poisoning Attack.mp4
43 MB
46. How DNS Cache Poisoning Works.mp4
23 MB
47. DNS Cache Poisoning Attack.mp4
30 MB
48. VLAN Hopping Attacks.mp4
22 MB
49. Bypassing Network Access Control.mp4
20 MB
50. Network Based Attacks Review.mp4
33 MB
51. Host Protocol Attacks and Tools Overview.mp4
25 MB
52. Server Message Block (SMB) Protocol.mp4
25 MB
53. Attacking the SMB Protocol.mp4
71 MB
54. Simple Network Management Protocol (SNMP).mp4
34 MB
55. Exploiting the SNMP Protocol.mp4
83 MB
56. Denial of Service Attacks.mp4
32 MB
57. Analyzing the LLMNR Protocol.mp4
26 MB
58. Attacking the LLMNR Protocol.mp4
35 MB
59. Host Protocol Attacks and Tools Review.mp4
19 MB
60. Wireless and Mobile Device Attacks and Tools.mp4
42 MB
61. Sniffing Wireless Data.mp4
40 MB
62. Wireless Analysis With Kismet.mp4
43 MB
63. Wireless Deauthentication Attacks.mp4
24 MB
64. Cracking WPA2 Preshared Keys.mp4
32 MB
65. Wireless Evil Twin Attack.mp4
56 MB
66. Automated Wifi Attack Tools.mp4
34 MB
67. Section Review.mp4
22 MB
68. OWASP Top 10 (1 thru 3).mp4
57 MB
69. OWASP Top 10 (4 thru 6).mp4
37 MB
70. OWASP Top 10 (7 thru 10).mp4
45 MB
71. Cross Site Scripting (XSS) and Cross Site Request Forgery (CSRF).mp4
29 MB
72. SQL Injection Attacks.mp4
26 MB
73. File Inclusion Vulnerabilities.mp4
39 MB
74. Additional Web App Vulnerabilities and Attacks.mp4
30 MB
75. Web Application Pentesting.mp4
21 MB
76. OWASP ZAP.mp4
72 MB
77. Attack Scans Using OWASP ZAP.mp4
42 MB
78. Brute Force Attack Using OWASP ZAP.mp4
52 MB
79. SQL Injection Using SQLmap.mp4
72 MB
80. Local and Remote File Inclusion Attacks.mp4
49 MB
81. Cross Site Scripting (XSS) Attacks.mp4
31 MB
82. Bind and Reverse Shells.mp4
36 MB
83. The Power of Web Shells.mp4
57 MB
84. Working With Bind and Reverse Shells.mp4
29 MB
85. Shell One-Liners.mp4
24 MB
86. Spawning Meterpreter Shells.mp4
57 MB
87. Log Poisoning for a Shell.mp4
58 MB
88. Windows Privilege Escalation Pt.1.mp4
36 MB
89. Windows Privilege Escalation Pt.2.mp4
29 MB
90. Getting a Windows Shell.mp4
58 MB
91. Windows Local Host Enumeration.mp4
50 MB
92. Windows Unquoted Service Path Vulnerability.mp4
46 MB
93. Windows Local Exploit Privilege Escalation.mp4
87 MB
94. Introduction to Privilege Escalation.mp4
46 MB
95. Linux Privilege Escalation Pt.1.mp4
30 MB
96. Linux Privilege Escalation Pt.2.mp4
33 MB
97. Linux Shell Escalation.mp4
31 MB
98. Linux Local Host Enumeration.mp4
62 MB
99. Linux Privilege Escalation Via Cron Jobs.mp4
46 MB
100. Linux SUID and SUDO privilege escalation.mp4
41 MB
101. Linux Local Exploit Privilege Escalation.mp4
80 MB
102. Physical Pentest Documents.mp4
38 MB
103. Reconnaissance and Planning.mp4
29 MB
104. Physical Pentest Tools.mp4
53 MB
105. Getting Inside.mp4
34 MB
106. Continuing From the Inside.mp4
31 MB
107. Physical Pentest Report.mp4
28 MB
108. Credential Attacks Pt.1.mp4
38 MB
109Credential Attacks Pt.2.mp4
43 MB
110. Creating Custom Wordlists.mp4
61 MB
111. Performing a Brute Force Attack.mp4
50 MB
112. Cracking Hashed Passwords.mp4
73 MB
113. Executing a Pass the Hash Attack.mp4
28 MB
114. Credential Harvesting and PrivEsc in the Cloud.mp4
56 MB
115. Running PACU.mp4
56 MB
116. Misconfigured Cloud Assets.mp4
40 MB
117. Running CloudSploit.mp4
60 MB
118. Resource Exhaustion, Malware Injection and API Attacks.mp4
29 MB
119. Side Channel and Direct-To-Origin Attacks.mp4
32 MB
120. Additional Cloud Pentesting Tools.mp4
21 MB
121. Mobile Device Attacks.mp4
20 MB
122. Mobile Device Vulnerabilities.mp4
47 MB
123. Mobile Security Tools.mp4
27 MB
124. Internet of Things (IoT) Devices.mp4
40 MB
125. Data Storage System Vulnerabilities.mp4
35 MB
126. SCADA, IIoT and ICS Vulnerabilities.mp4
28 MB
127. Virtual Environment Vulnerabilities.mp4
28 MB
128. Establishing Persistence.mp4
23 MB
129. Lateral Movement.mp4
42 MB
130. Data Exfiltration.mp4
31 MB
131. Covering Your Tracks.mp4
30 MB
132. Linux Post Exploit Activities.mp4
64 MB
133. Windows Post Exploit Activities.mp4
73 MB
134. Analyze a Basic Script.mp4
82 MB
135. Scripting Basics.mp4
123 MB
136. Assigning Values to Variables.mp4
87 MB
137. Operating on Variables with Operators.mp4
77 MB
138. Branching Code with Conditionals.mp4
84 MB
139. Reapeating Code with Loops.mp4
91 MB
140. Handling Errors in Code.mp4
89 MB
141. Intro.mp4
17 MB
142. Analyzing PING Scripts.mp4
58 MB
143. Downloading Files with Scripts.mp4
23 MB
144. Automation with Scripts.mp4
86 MB
145. Updating IP Settings with a Script.mp4
38 MB
146. NMAP Reports in HTML.mp4
49 MB