TorBT - Torrents and Magnet Links Search Engine

[ WebToolTip.com ] Post-exploitation and Lateral Movements for CompTIA Pentest +

File Name
Size
Get Bonus Downloads Here.url
180 B
~Get Your Files Here !/01/establishing-a-foothold-persistence-techniques-slides.pdf
4.9 MB
~Get Your Files Here !/02/expanding-reach-lateral-movement-techniques-slides.pdf
4.6 MB
~Get Your Files Here !/03/stealing-the-crown-jewels-staging-and-exfiltration-slides.pdf
3.9 MB
~Get Your Files Here !/04/cleanup-and-restoration-slides.pdf
3.0 MB
~Get Your Files Here !/1-Establishing a Foothold Persistence Techniques/1 -Scheduled Tasks, Cron Jobs, and Service Creation.mp4
58 MB
~Get Your Files Here !/1-Establishing a Foothold Persistence Techniques/2 -Reverse Shells.mp4
31 MB
~Get Your Files Here !/1-Establishing a Foothold Persistence Techniques/3 -Bind Shells.mp4
2.9 MB
~Get Your Files Here !/1-Establishing a Foothold Persistence Techniques/4 -Advanced Tools for Shells.mp4
38 MB
~Get Your Files Here !/1-Establishing a Foothold Persistence Techniques/5 -Adding Accounts and Using C2 Frameworks.mp4
17 MB
~Get Your Files Here !/1-Establishing a Foothold Persistence Techniques/6 -Backdoors and Rootkits.mp4
28 MB
~Get Your Files Here !/1-Establishing a Foothold Persistence Techniques/7 -Browser Extensions and Security Controls.mp4
8.9 MB
~Get Your Files Here !/2-Expanding Reach Lateral Movement Techniques/10 -Enumeration.mp4
21 MB
~Get Your Files Here !/2-Expanding Reach Lateral Movement Techniques/11 -Windows Management Instrumentation (WMI).mp4
25 MB
~Get Your Files Here !/2-Expanding Reach Lateral Movement Techniques/12 -Other Lateral Movement Tools.mp4
21 MB
~Get Your Files Here !/2-Expanding Reach Lateral Movement Techniques/8 -Moving Laterally.mp4
35 MB
~Get Your Files Here !/2-Expanding Reach Lateral Movement Techniques/9 -Demo SShuttle.mp4
6.4 MB
~Get Your Files Here !/3-Stealing the Crown Jewels Staging and Exfiltration/13 -File Encryption and Compression.mp4
38 MB
~Get Your Files Here !/3-Stealing the Crown Jewels Staging and Exfiltration/14 -Covert Channels and Email.mp4
24 MB
~Get Your Files Here !/3-Stealing the Crown Jewels Staging and Exfiltration/15 -Cloud Vectors.mp4
29 MB
~Get Your Files Here !/3-Stealing the Crown Jewels Staging and Exfiltration/16 -File-based Exfiltration Vectors.mp4
37 MB
~Get Your Files Here !/4-Cleanup and Restoration/17 -Remove Persistence Mechanisms.mp4
32 MB
~Get Your Files Here !/4-Cleanup and Restoration/18 -Configuration Changes.mp4
20 MB
~Get Your Files Here !/4-Cleanup and Restoration/19 -Closing the Loop Cleanup, Documentation, and Data Security.mp4
38 MB
~Get Your Files Here !/Bonus Resources.txt
70 B